Cross-Model Anecdotes – full_cve_ids_3.1_header · seed=42 · metric=av
Models: xlnet, lrp-bert, lrp-distilbert

#1 · cve_id CVE-2021-41827 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
Zoho ManageEngine Remote ▁Access ▁Plus ▁before ▁10 . 1 . 212 1 . 1 ▁has hardcoded credential s ▁for read-only ▁access . ▁The credential s ▁are ▁in ▁the ▁source ▁code ▁that ▁correspond s ▁to ▁the ▁DC Backup Restore JAR ▁archive . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
Zoho ManageEngine Remote Access Plus before 10.1.2121.1 has hardcoded credentials for read-only access. The credentials are in the source code that corresponds to the DCBackupRestore JAR archive.
SHAP (words)
Zoho ManageEngine Remote Access Plus before 10. 1. 2121. 1 has hardcoded credentials for read- only access. The credentials are in the source code that corresponds to the DCBackupRestore JAR archive
lrp-bert · Pred=NETWORK (0) · p=0.99 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Zoho ManageEngine Remote Access Plus before 10 . 1 . 212 ##1 . 1 has hardcoded credential s for read-only access . The credential s are in the source code that corresponds to the DC Backup Restore JAR archive . [SEP]
LRP (+Pred, pos-only)
[CLS] Zoho ManageEngine Remote Access Plus before 10 . 1 . 212 ##1 . 1 has hardcoded credential s for read-only access . The credential s are in the source code that corresponds to the DC Backup Restore JAR archive . [SEP]
LIME (words)
Zoho ManageEngine Remote Access Plus before 10.1.2121.1 has hardcoded credentials for read-only access. The credentials are in the source code that corresponds to the DCBackupRestore JAR archive.
SHAP (words)
Zoho ManageEngine Remote Access Plus before 10. 1. 2121. 1 has hardcoded credentials for read- only access. The credentials are in the source code that corresponds to the DCBackupRestore JAR archive
lrp-distilbert · Pred=NETWORK (0) · p=0.98 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Zoho ManageEngine Remote Access Plus before 10 . 1 . 212 ##1 . 1 has hardcoded credential s for read-only access . The credential s are in the source code that corresponds to the DC Backup Restore JAR archive . [SEP]
LRP (+Pred, pos-only)
[CLS] Zoho ManageEngine Remote Access Plus before 10 . 1 . 212 ##1 . 1 has hardcoded credential s for read-only access . The credential s are in the source code that corresponds to the DC Backup Restore JAR archive . [SEP]
LIME (words)
Zoho ManageEngine Remote Access Plus before 10.1.2121.1 has hardcoded credentials for read-only access. The credentials are in the source code that corresponds to the DCBackupRestore JAR archive.
SHAP (words)
Zoho ManageEngine Remote Access Plus before 10. 1. 2121. 1 has hardcoded credentials for read- only access. The credentials are in the source code that corresponds to the DCBackupRestore JAR archive
#2 · cve_id CVE-2019-11341 · av
GT=PHYSICAL (3)
xlnet · Pred=PHYSICAL (3) · p=0.99 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁On ▁certain ▁Samsung ▁P ( 9 . 0 ) ▁phones ▁an ▁attacker ▁with ▁physical ▁access ▁can ▁start ▁a TCP Dump ▁c apt ure ▁without ▁the ▁user ' s ▁knowledge . ▁This ▁feature ▁of ▁the ▁Service ▁Mode ▁application ▁is ▁available ▁after ▁entering ▁the ▁* # 99 00 # ▁check ▁code ▁but ▁is ▁protected ▁by ▁an OTP ▁password . ▁However ▁this ▁password ▁is ▁created ▁locally ▁and ( due ▁to mishandling ▁of cryptography ) ▁can ▁be ▁obtained ▁easily ▁by ▁reversing ▁the ▁password ▁creation ▁logic . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
On certain Samsung P(9.0) phones an attacker with physical access can start a TCP Dump capture without the user's knowledge. This feature of the Service Mode application is available after entering the *#9900# check code but is protected by an OTP password. However this password is created locally and (due to mishandling of cryptography) can be obtained easily by reversing the password creation logic.
SHAP (words)
On certain Samsung P( 9. 0) phones an attacker with physical access can start a TCP Dump capture without the user' s knowledge. This feature of the Service Mode application is available after entering the *# 9900# check code but is protected by an OTP password. However this password is created locally and ( due to mishandling of cryptography) can be obtained easily by reversing the password creation logic
lrp-bert · Pred=PHYSICAL (3) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] On certain Samsung P ( 9 . 0 ) phones an attacker with physical access can s tar t a TCP Dump c apt u ##re without the user ' s knowledge . This feature of the Service Mode application is available after entering the * # 99 ##00 # check code but is protected by an OTP password . However this password is created locally and ( due to mishandling of cryptography ) can be obtained easily by re ##versing the password creation logic . [SEP]
LRP (+Pred, pos-only)
[CLS] On certain Samsung P ( 9 . 0 ) phones an attacker with physical access can s tar t a TCP Dump c apt u ##re without the user ' s knowledge . This feature of the Service Mode application is available after entering the * # 99 ##00 # check code but is protected by an OTP password . However this password is created locally and ( due to mishandling of cryptography ) can be obtained easily by re ##versing the password creation logic . [SEP]
LIME (words)
On certain Samsung P(9.0) phones an attacker with physical access can start a TCP Dump capture without the user's knowledge. This feature of the Service Mode application is available after entering the *#9900# check code but is protected by an OTP password. However this password is created locally and (due to mishandling of cryptography) can be obtained easily by reversing the password creation logic.
SHAP (words)
On certain Samsung P( 9. 0) phones an attacker with physical access can start a TCP Dump capture without the user' s knowledge. This feature of the Service Mode application is available after entering the *# 9900# check code but is protected by an OTP password. However this password is created locally and ( due to mishandling of cryptography) can be obtained easily by reversing the password creation logic
lrp-distilbert · Pred=PHYSICAL (3) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] On certain Samsung P ( 9 . 0 ) phones an attacker with physical access can s tar t a TCP Dump c apt u ##re without the user ' s knowledge . This feature of the Service Mode application is available after entering the * # 99 ##00 # check code but is protected by an OTP password . However this password is created locally and ( due to mishandling of cryptography ) can be obtained easily by re ##versing the password creation logic . [SEP]
LRP (+Pred, pos-only)
[CLS] On certain Samsung P ( 9 . 0 ) phones an attacker with physical access can s tar t a TCP Dump c apt u ##re without the user ' s knowledge . This feature of the Service Mode application is available after entering the * # 99 ##00 # check code but is protected by an OTP password . However this password is created locally and ( due to mishandling of cryptography ) can be obtained easily by re ##versing the password creation logic . [SEP]
LIME (words)
On certain Samsung P(9.0) phones an attacker with physical access can start a TCP Dump capture without the user's knowledge. This feature of the Service Mode application is available after entering the *#9900# check code but is protected by an OTP password. However this password is created locally and (due to mishandling of cryptography) can be obtained easily by reversing the password creation logic.
SHAP (words)
On certain Samsung P( 9. 0) phones an attacker with physical access can start a TCP Dump capture without the user' s knowledge. This feature of the Service Mode application is available after entering the *# 9900# check code but is protected by an OTP password. However this password is created locally and ( due to mishandling of cryptography) can be obtained easily by reversing the password creation logic
#3 · cve_id CVE-2022-29303 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
SolarView Compact ver . 6 . 00 ▁was ▁di sc ▁over ed ▁to ▁contain ▁a ▁command inject ion ▁vulnerability ▁via conf _ mail . php . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
SolarView Compact ver.6.00 was discovered to contain a command injection vulnerability via conf_mail.php.
SHAP (words)
SolarView Compact ver. 6. 00 was discovered to contain a command injection vulnerability via conf_mail. php
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] SolarView Compact ve ##r . 6 . 00 was di sc over ##ed to contain a command inject ion vulnerability via con ##f _ mail . php . [SEP]
LRP (+Pred, pos-only)
[CLS] SolarView Compact ve ##r . 6 . 00 was di sc over ##ed to contain a command inject ion vulnerability via con ##f _ mail . php . [SEP]
LIME (words)
SolarView Compact ver.6.00 was discovered to contain a command injection vulnerability via conf_mail.php.
SHAP (words)
SolarView Compact ver. 6. 00 was discovered to contain a command injection vulnerability via conf_mail. php
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] SolarView Compact ve ##r . 6 . 00 was di sc over ##ed to contain a command inject ion vulnerability via con ##f _ mail . php . [SEP]
LRP (+Pred, pos-only)
[CLS] SolarView Compact ve ##r . 6 . 00 was di sc over ##ed to contain a command inject ion vulnerability via con ##f _ mail . php . [SEP]
LIME (words)
SolarView Compact ver.6.00 was discovered to contain a command injection vulnerability via conf_mail.php.
SHAP (words)
SolarView Compact ver. 6. 00 was discovered to contain a command injection vulnerability via conf_mail. php
#4 · cve_id CVE-2024-0538 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁A ▁vulnerability ▁has ▁been ▁found ▁in Tenda ▁W 9 ▁1 . 0 . 0 . 7 ( 44 56 ) ▁and cla ssi fi ed ▁as ▁critical . ▁This ▁vulnerability ▁affects ▁the ▁function ▁form Q os Manage ▁_ auto ▁of ▁the ▁component httpd . ▁The ▁manipulation ▁of ▁the ▁argument ssid ▁Index ▁leads ▁to stack-based ▁buffer overflow . ▁The ▁attack ▁can ▁be init iated ▁remotely . ▁The ▁exploit ▁has ▁been disclose d ▁to ▁the ▁public ▁and ▁may ▁be ▁used . ▁The identifier ▁of ▁this ▁vulnerability ▁is ▁V DB - 25 07 08 . NOT ▁E : ▁The ▁vendor ▁was ▁contacted ▁early ▁about ▁this ▁di sc los ure ▁but ▁did ▁not ▁respond ▁in ▁any ▁way . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
A vulnerability has been found in Tenda W9 1.0.0.7(4456) and classified as critical. This vulnerability affects the function formQosManage_auto of the component httpd. The manipulation of the argument ssidIndex leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250708. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
SHAP (words)
A vulnerability has been found in Tenda W9 1. 0. 0. 7( 4456) and classified as critical. This vulnerability affects the function formQosManage_auto of the component httpd. The manipulation of the argument ssidIndex leads to stack- based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB- 250708. NOTE: The vendor was contacted early about this disclosure but did not respond in any way
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] A vulnerability has been found in Tenda W ##9 1 . 0 . 0 . 7 ( 44 ##5 ##6 ) and c ##la ssi fi ##ed as critical . This vulnerability affects the function form ##Q ##os Manage _ auto of the component httpd . The man ip ul ##ation of the argument ssid Index leads to stack-based buffer overflow . The attack can be init i ##ated remotely . The exploit has been disclose d to the public and may be used . The identifier of this vulnerability is V ##D ##B - 250 ##70 ##8 . NOT E : The vendor was contacted early about this di sc los ##ure but did not respond in any way . [SEP]
LRP (+Pred, pos-only)
[CLS] A vulnerability has been found in Tenda W ##9 1 . 0 . 0 . 7 ( 44 ##5 ##6 ) and c ##la ssi fi ##ed as critical . This vulnerability affects the function form ##Q ##os Manage _ auto of the component httpd . The man ip ul ##ation of the argument ssid Index leads to stack-based buffer overflow . The attack can be init i ##ated remotely . The exploit has been disclose d to the public and may be used . The identifier of this vulnerability is V ##D ##B - 250 ##70 ##8 . NOT E : The vendor was contacted early about this di sc los ##ure but did not respond in any way . [SEP]
LIME (words)
A vulnerability has been found in Tenda W9 1.0.0.7(4456) and classified as critical. This vulnerability affects the function formQosManage_auto of the component httpd. The manipulation of the argument ssidIndex leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250708. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
SHAP (words)
A vulnerability has been found in Tenda W9 1. 0. 0. 7( 4456) and classified as critical. This vulnerability affects the function formQosManage_auto of the component httpd. The manipulation of the argument ssidIndex leads to stack- based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB- 250708. NOTE: The vendor was contacted early about this disclosure but did not respond in any way
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] A vulnerability has been found in Tenda W ##9 1 . 0 . 0 . 7 ( 44 ##5 ##6 ) and c ##la ssi fi ##ed as critical . This vulnerability affects the function form ##Q ##os Manage _ auto of the component httpd . The man ip ul ##ation of the argument ssid Index leads to stack-based buffer overflow . The attack can be init i ##ated remotely . The exploit has been disclose d to the public and may be used . The identifier of this vulnerability is V ##D ##B - 250 ##70 ##8 . NOT E : The vendor was contacted early about this di sc los ##ure but did not respond in any way . [SEP]
LRP (+Pred, pos-only)
[CLS] A vulnerability has been found in Tenda W ##9 1 . 0 . 0 . 7 ( 44 ##5 ##6 ) and c ##la ssi fi ##ed as critical . This vulnerability affects the function form ##Q ##os Manage _ auto of the component httpd . The man ip ul ##ation of the argument ssid Index leads to stack-based buffer overflow . The attack can be init i ##ated remotely . The exploit has been disclose d to the public and may be used . The identifier of this vulnerability is V ##D ##B - 250 ##70 ##8 . NOT E : The vendor was contacted early about this di sc los ##ure but did not respond in any way . [SEP]
LIME (words)
A vulnerability has been found in Tenda W9 1.0.0.7(4456) and classified as critical. This vulnerability affects the function formQosManage_auto of the component httpd. The manipulation of the argument ssidIndex leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250708. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
SHAP (words)
A vulnerability has been found in Tenda W9 1. 0. 0. 7( 4456) and classified as critical. This vulnerability affects the function formQosManage_auto of the component httpd. The manipulation of the argument ssidIndex leads to stack- based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB- 250708. NOTE: The vendor was contacted early about this disclosure but did not respond in any way
#5 · cve_id CVE-2020-25596 · av
GT=LOCAL (2)
xlnet · Pred=LOCAL (2) · p=0.99 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁An ▁issue ▁was ▁di sc ▁over ed ▁in Xen ▁through ▁4 . 14 . x . ▁x 86 PV ▁guest kernels ▁can ▁experience ▁denial ▁of ▁service ▁via ▁SY S EN TER . ▁The ▁SY S EN TER ▁instruction ▁leaves ▁various ▁state sanitization ▁activities ▁to ▁software . ▁One ▁of Xen ' s sanitization ▁paths inject s ▁a # GP ▁fault ▁and ▁incorrectly ▁delivers ▁it ▁twice ▁to ▁the ▁guest . ▁This ▁causes ▁the ▁guest ▁kernel ▁to ▁observe ▁a ▁kernel - priv ile ge # GP ▁fault ( typical ly ▁fatal ) ▁rather ▁than ▁a ▁user - priv ile ge # GP ▁fault ( usually ▁converted ▁into SIGSEGV / et c . ) . Malicious ▁or buggy userspace ▁can ▁crash ▁the ▁guest ▁kernel ▁resulting ▁in ▁a VM Denial ▁of ▁Service . ▁All ▁versions ▁of Xen ▁from ▁3 . 2 ▁onwards ▁are ▁vulnerable . ▁Only ▁x 86 ▁systems ▁are ▁vulnerable . ARM ▁platforms ▁are ▁not ▁vulnerable . ▁Only ▁x 86 ▁systems ▁that ▁support ▁the ▁SY S EN TER ▁instruction ▁in ▁64 bit ▁mode ▁are ▁vulnerable . ▁This ▁is ▁believed ▁to ▁be ▁Intel ▁Cent a ur ▁and ▁Shanghai CPUs . AMD ▁and ▁Hy gon CPUs ▁are ▁not ▁believed ▁to ▁be ▁vulnerable . ▁Only ▁x 86 PV ▁guests ▁can ▁exploit ▁the ▁vulnerability . ▁x 86 PVH / HVM ▁guests ▁cannot ▁exploit ▁the ▁vulnerability . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
An issue was discovered in Xen through 4.14.x. x86 PV guest kernels can experience denial of service via SYSENTER. The SYSENTER instruction leaves various state sanitization activities to software. One of Xen's sanitization paths injects a #GP fault and incorrectly delivers it twice to the guest. This causes the guest kernel to observe a kernel-privilege #GP fault (typically fatal) rather than a user-privilege #GP fault (usually converted into SIGSEGV/etc.). Malicious or buggy userspace can crash the guest kernel resulting in a VM Denial of Service. All versions of Xen from 3.2 onwards are vulnerable. Only x86 systems are vulnerable. ARM platforms are not vulnerable. Only x86 systems that support the SYSENTER instruction in 64bit mode are vulnerable. This is believed to be Intel Centaur and Shanghai CPUs. AMD and Hygon CPUs are not believed to be vulnerable. Only x86 PV guests can exploit the vulnerability. x86 PVH / HVM guests cannot exploit the vulnerability.
SHAP (words)
An issue was discovered in Xen through 4. 14. x. x86 PV guest kernels can experience denial of service via SYSENTER. The SYSENTER instruction leaves various state sanitization activities to software. One of Xen' s sanitization paths injects a # GP fault and incorrectly delivers it twice to the guest. This causes the guest kernel to observe a kernel- privilege # GP fault ( typically fatal) rather than a user- privilege # GP fault ( usually converted into SIGSEGV/ etc.). Malicious or buggy userspace can crash the guest kernel resulting in a VM Denial of Service. All versions of Xen from 3. 2 onwards are vulnerable. Only x86 systems are vulnerable. ARM platforms are not vulnerable. Only x86 systems that support the SYSENTER instruction in 64bit mode are vulnerable. This is believed to be Intel Centaur and Shanghai CPUs. AMD and Hygon CPUs are not believed to be vulnerable. Only x86 PV guests can exploit the vulnerability. x86 PVH / HVM guests cannot exploit the vulnerability
lrp-bert · Pred=LOCAL (2) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] An issue was di sc over ##ed in Xen through 4 . 14 . x . x ##86 PV guest kernels can experience denial of service via S ##Y ##SE NT ER . The S ##Y ##SE NT ER in struct ion leaves various state sanitization activities to software . One of Xen ' s sanitization paths inject s a # GP fault and incorrectly delivers it twice to the guest . This causes the guest kernel to observe a kernel - privilege # GP fault ( typically fatal ) rather than a user - privilege # GP fault ( usually converted int o SIGSEGV / etc . ) . Malicious or buggy userspace can crash the guest kernel resulting in a VM Denial of Service . All versions of Xen from 3 . 2 onwards are vulnerable . Only x ##86 systems are vulnerable . ARM platforms are not vulnerable . Only x ##86 systems that support the S ##Y ##SE NT ER in struct ion in 64 ##bit mod e are vulnerable . This is believed to be Intel Ce ##nta ##ur and Shanghai CPUs . AMD and H ##y ##gon CPUs are not believed to be vulnerable . Only x ##86 PV guests can exploit the vulnerability . x ##86 PVH / HVM guests cannot exploit the vulnerability . [SEP]
LRP (+Pred, pos-only)
[CLS] An issue was di sc over ##ed in Xen through 4 . 14 . x . x ##86 PV guest kernels can experience denial of service via S ##Y ##SE NT ER . The S ##Y ##SE NT ER in struct ion leaves various state sanitization activities to software . One of Xen ' s sanitization paths inject s a # GP fault and incorrectly delivers it twice to the guest . This causes the guest kernel to observe a kernel - privilege # GP fault ( typically fatal ) rather than a user - privilege # GP fault ( usually converted int o SIGSEGV / etc . ) . Malicious or buggy userspace can crash the guest kernel resulting in a VM Denial of Service . All versions of Xen from 3 . 2 onwards are vulnerable . Only x ##86 systems are vulnerable . ARM platforms are not vulnerable . Only x ##86 systems that support the S ##Y ##SE NT ER in struct ion in 64 ##bit mod e are vulnerable . This is believed to be Intel Ce ##nta ##ur and Shanghai CPUs . AMD and H ##y ##gon CPUs are not believed to be vulnerable . Only x ##86 PV guests can exploit the vulnerability . x ##86 PVH / HVM guests cannot exploit the vulnerability . [SEP]
LIME (words)
An issue was discovered in Xen through 4.14.x. x86 PV guest kernels can experience denial of service via SYSENTER. The SYSENTER instruction leaves various state sanitization activities to software. One of Xen's sanitization paths injects a #GP fault and incorrectly delivers it twice to the guest. This causes the guest kernel to observe a kernel-privilege #GP fault (typically fatal) rather than a user-privilege #GP fault (usually converted into SIGSEGV/etc.). Malicious or buggy userspace can crash the guest kernel resulting in a VM Denial of Service. All versions of Xen from 3.2 onwards are vulnerable. Only x86 systems are vulnerable. ARM platforms are not vulnerable. Only x86 systems that support the SYSENTER instruction in 64bit mode are vulnerable. This is believed to be Intel Centaur and Shanghai CPUs. AMD and Hygon CPUs are not believed to be vulnerable. Only x86 PV guests can exploit the vulnerability. x86 PVH / HVM guests cannot exploit the vulnerability.
SHAP (words)
An issue was discovered in Xen through 4. 14. x. x86 PV guest kernels can experience denial of service via SYSENTER. The SYSENTER instruction leaves various state sanitization activities to software. One of Xen' s sanitization paths injects a # GP fault and incorrectly delivers it twice to the guest. This causes the guest kernel to observe a kernel- privilege # GP fault ( typically fatal) rather than a user- privilege # GP fault ( usually converted into SIGSEGV/ etc.). Malicious or buggy userspace can crash the guest kernel resulting in a VM Denial of Service. All versions of Xen from 3. 2 onwards are vulnerable. Only x86 systems are vulnerable. ARM platforms are not vulnerable. Only x86 systems that support the SYSENTER instruction in 64bit mode are vulnerable. This is believed to be Intel Centaur and Shanghai CPUs. AMD and Hygon CPUs are not believed to be vulnerable. Only x86 PV guests can exploit the vulnerability. x86 PVH / HVM guests cannot exploit the vulnerability
lrp-distilbert · Pred=LOCAL (2) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] An issue was di sc over ##ed in Xen through 4 . 14 . x . x ##86 PV guest kernels can experience denial of service via S ##Y ##SE NT ER . The S ##Y ##SE NT ER in struct ion leaves various state sanitization activities to software . One of Xen ' s sanitization paths inject s a # GP fault and incorrectly delivers it twice to the guest . This causes the guest kernel to observe a kernel - privilege # GP fault ( typically fatal ) rather than a user - privilege # GP fault ( usually converted int o SIGSEGV / etc . ) . Malicious or buggy userspace can crash the guest kernel resulting in a VM Denial of Service . All versions of Xen from 3 . 2 onwards are vulnerable . Only x ##86 systems are vulnerable . ARM platforms are not vulnerable . Only x ##86 systems that support the S ##Y ##SE NT ER in struct ion in 64 ##bit mod e are vulnerable . This is believed to be Intel Ce ##nta ##ur and Shanghai CPUs . AMD and H ##y ##gon CPUs are not believed to be vulnerable . Only x ##86 PV guests can exploit the vulnerability . x ##86 PVH / HVM guests cannot exploit the vulnerability . [SEP]
LRP (+Pred, pos-only)
[CLS] An issue was di sc over ##ed in Xen through 4 . 14 . x . x ##86 PV guest kernels can experience denial of service via S ##Y ##SE NT ER . The S ##Y ##SE NT ER in struct ion leaves various state sanitization activities to software . One of Xen ' s sanitization paths inject s a # GP fault and incorrectly delivers it twice to the guest . This causes the guest kernel to observe a kernel - privilege # GP fault ( typically fatal ) rather than a user - privilege # GP fault ( usually converted int o SIGSEGV / etc . ) . Malicious or buggy userspace can crash the guest kernel resulting in a VM Denial of Service . All versions of Xen from 3 . 2 onwards are vulnerable . Only x ##86 systems are vulnerable . ARM platforms are not vulnerable . Only x ##86 systems that support the S ##Y ##SE NT ER in struct ion in 64 ##bit mod e are vulnerable . This is believed to be Intel Ce ##nta ##ur and Shanghai CPUs . AMD and H ##y ##gon CPUs are not believed to be vulnerable . Only x ##86 PV guests can exploit the vulnerability . x ##86 PVH / HVM guests cannot exploit the vulnerability . [SEP]
LIME (words)
An issue was discovered in Xen through 4.14.x. x86 PV guest kernels can experience denial of service via SYSENTER. The SYSENTER instruction leaves various state sanitization activities to software. One of Xen's sanitization paths injects a #GP fault and incorrectly delivers it twice to the guest. This causes the guest kernel to observe a kernel-privilege #GP fault (typically fatal) rather than a user-privilege #GP fault (usually converted into SIGSEGV/etc.). Malicious or buggy userspace can crash the guest kernel resulting in a VM Denial of Service. All versions of Xen from 3.2 onwards are vulnerable. Only x86 systems are vulnerable. ARM platforms are not vulnerable. Only x86 systems that support the SYSENTER instruction in 64bit mode are vulnerable. This is believed to be Intel Centaur and Shanghai CPUs. AMD and Hygon CPUs are not believed to be vulnerable. Only x86 PV guests can exploit the vulnerability. x86 PVH / HVM guests cannot exploit the vulnerability.
SHAP (words)
An issue was discovered in Xen through 4. 14. x. x86 PV guest kernels can experience denial of service via SYSENTER. The SYSENTER instruction leaves various state sanitization activities to software. One of Xen' s sanitization paths injects a # GP fault and incorrectly delivers it twice to the guest. This causes the guest kernel to observe a kernel- privilege # GP fault ( typically fatal) rather than a user- privilege # GP fault ( usually converted into SIGSEGV/ etc.). Malicious or buggy userspace can crash the guest kernel resulting in a VM Denial of Service. All versions of Xen from 3. 2 onwards are vulnerable. Only x86 systems are vulnerable. ARM platforms are not vulnerable. Only x86 systems that support the SYSENTER instruction in 64bit mode are vulnerable. This is believed to be Intel Centaur and Shanghai CPUs. AMD and Hygon CPUs are not believed to be vulnerable. Only x86 PV guests can exploit the vulnerability. x86 PVH / HVM guests cannot exploit the vulnerability
#6 · cve_id CVE-2018-7935 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁There ▁is ▁a ▁vulnerability ▁in ▁21 . 3 28 . 01 . 00 . 00 ▁version ▁of ▁the ▁E 55 73 C s - 32 2 . Remote ▁attackers ▁could ▁exploit ▁this ▁vulnerability ▁to ▁make ▁the ▁network ▁where ▁the ▁E 55 73 C s - 32 2 ▁is ▁running temp ▁or arily ▁unavailable . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
There is a vulnerability in 21.328.01.00.00 version of the E5573Cs-322. Remote attackers could exploit this vulnerability to make the network where the E5573Cs-322 is running temporarily unavailable.
SHAP (words)
There is a vulnerability in 21. 328. 01. 00. 00 version of the E5573Cs- 322. Remote attackers could exploit this vulnerability to make the network where the E5573Cs- 322 is running temporarily unavailable
lrp-bert · Pred=NETWORK (0) · p=0.99 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] There is a vulnerability in 21 . 32 ##8 . 01 . 00 . 00 version of the E ##55 ##7 ##3 ##Cs - 322 . Remote attackers could exploit this vulnerability to make the network where the E ##55 ##7 ##3 ##Cs - 322 is running temp or ##arily unavailable . [SEP]
LRP (+Pred, pos-only)
[CLS] There is a vulnerability in 21 . 32 ##8 . 01 . 00 . 00 version of the E ##55 ##7 ##3 ##Cs - 322 . Remote attackers could exploit this vulnerability to make the network where the E ##55 ##7 ##3 ##Cs - 322 is running temp or ##arily unavailable . [SEP]
LIME (words)
There is a vulnerability in 21.328.01.00.00 version of the E5573Cs-322. Remote attackers could exploit this vulnerability to make the network where the E5573Cs-322 is running temporarily unavailable.
SHAP (words)
There is a vulnerability in 21. 328. 01. 00. 00 version of the E5573Cs- 322. Remote attackers could exploit this vulnerability to make the network where the E5573Cs- 322 is running temporarily unavailable
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] There is a vulnerability in 21 . 32 ##8 . 01 . 00 . 00 version of the E ##55 ##7 ##3 ##Cs - 322 . Remote attackers could exploit this vulnerability to make the network where the E ##55 ##7 ##3 ##Cs - 322 is running temp or ##arily unavailable . [SEP]
LRP (+Pred, pos-only)
[CLS] There is a vulnerability in 21 . 32 ##8 . 01 . 00 . 00 version of the E ##55 ##7 ##3 ##Cs - 322 . Remote attackers could exploit this vulnerability to make the network where the E ##55 ##7 ##3 ##Cs - 322 is running temp or ##arily unavailable . [SEP]
LIME (words)
There is a vulnerability in 21.328.01.00.00 version of the E5573Cs-322. Remote attackers could exploit this vulnerability to make the network where the E5573Cs-322 is running temporarily unavailable.
SHAP (words)
There is a vulnerability in 21. 328. 01. 00. 00 version of the E5573Cs- 322. Remote attackers could exploit this vulnerability to make the network where the E5573Cs- 322 is running temporarily unavailable
#7 · cve_id CVE-2023-25653 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁node - jo se ▁is ▁a JavaScript ▁implementation ▁of ▁the JSON Object ▁Sign ing ▁and Encryption ( J OSE ) ▁for ▁web browsers ▁and ▁node . js - based ▁servers . ▁Prior ▁to ▁version ▁2 . 2 . 0 ▁when ▁using ▁the non-default " fallback " crypto back-end ECC ▁operations ▁in ▁` no de - jo se ` ▁can ▁trigger ▁a Denial-of-Service ( DoS ) ▁condition ▁due ▁to ▁a ▁po ssi ble ▁in f init e ▁loop ▁in ▁an ▁internal ▁calculation . ▁For ▁some ECC ▁operations ▁this ▁condition ▁is ▁triggered ▁randomly ; ▁for ▁others ▁it ▁can ▁be ▁triggered ▁by malicious ▁input . ▁The ▁issue ▁has ▁been patched ▁in ▁version ▁2 . 2 . 0 . ▁Since ▁this ▁issue ▁is ▁only ▁present ▁in ▁the " fallback " crypto ▁implementation ▁it ▁can ▁be ▁avoided ▁by ▁ensuring ▁that ▁either ▁Web Crypto ▁or ▁the Node ▁` crypto ▁` ▁module ▁is ▁available ▁in ▁the JS ▁environment ▁where ▁` no de - jo se ` ▁is ▁being ▁run . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
node-jose is a JavaScript implementation of the JSON Object Signing and Encryption (JOSE) for web browsers and node.js-based servers. Prior to version 2.2.0 when using the non-default "fallback" crypto back-end ECC operations in `node-jose` can trigger a Denial-of-Service (DoS) condition due to a possible infinite loop in an internal calculation. For some ECC operations this condition is triggered randomly; for others it can be triggered by malicious input. The issue has been patched in version 2.2.0. Since this issue is only present in the "fallback" crypto implementation it can be avoided by ensuring that either WebCrypto or the Node `crypto` module is available in the JS environment where `node-jose` is being run.
SHAP (words)
node- jose is a JavaScript implementation of the JSON Object Signing and Encryption ( JOSE) for web browsers and node. js- based servers. Prior to version 2. 2. 0 when using the non- default " fallback" crypto back- end ECC operations in ` node- jose` can trigger a Denial- of- Service ( DoS) condition due to a possible infinite loop in an internal calculation. For some ECC operations this condition is triggered randomly; for others it can be triggered by malicious input. The issue has been patched in version 2. 2. 0. Since this issue is only present in the " fallback" crypto implementation it can be avoided by ensuring that either WebCrypto or the Node ` crypto` module is available in the JS environment where ` node- jose` is being run
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] node - j ##ose is a JavaScript implementation of the JSON Object Sign ##ing and Encryption ( J ##OS ##E ) for web browsers and node . js - based servers . Prior to version 2 . 2 . 0 when using the non-default " fallback " crypto back-end ECC operations in ` node - j ##ose ` can trigger a Denial-of-Service ( DoS ) condition due to a p ##o ssi b ##le in ##f init e loop in an int er ##nal calculation . For some ECC operations this condition is triggered randomly ; for others it can be triggered by malicious input . The issue has been patched in version 2 . 2 . 0 . Since this issue is only present in the " fallback " crypto implementation it can be avoided by en ##s uri ng that either Web Crypto or the Node ` crypto ` mod ul ##e is available in the JS environment where ` node - j ##ose ` is being run . [SEP]
LRP (+Pred, pos-only)
[CLS] node - j ##ose is a JavaScript implementation of the JSON Object Sign ##ing and Encryption ( J ##OS ##E ) for web browsers and node . js - based servers . Prior to version 2 . 2 . 0 when using the non-default " fallback " crypto back-end ECC operations in ` node - j ##ose ` can trigger a Denial-of-Service ( DoS ) condition due to a p ##o ssi b ##le in ##f init e loop in an int er ##nal calculation . For some ECC operations this condition is triggered randomly ; for others it can be triggered by malicious input . The issue has been patched in version 2 . 2 . 0 . Since this issue is only present in the " fallback " crypto implementation it can be avoided by en ##s uri ng that either Web Crypto or the Node ` crypto ` mod ul ##e is available in the JS environment where ` node - j ##ose ` is being run . [SEP]
LIME (words)
node-jose is a JavaScript implementation of the JSON Object Signing and Encryption (JOSE) for web browsers and node.js-based servers. Prior to version 2.2.0 when using the non-default "fallback" crypto back-end ECC operations in `node-jose` can trigger a Denial-of-Service (DoS) condition due to a possible infinite loop in an internal calculation. For some ECC operations this condition is triggered randomly; for others it can be triggered by malicious input. The issue has been patched in version 2.2.0. Since this issue is only present in the "fallback" crypto implementation it can be avoided by ensuring that either WebCrypto or the Node `crypto` module is available in the JS environment where `node-jose` is being run.
SHAP (words)
node- jose is a JavaScript implementation of the JSON Object Signing and Encryption ( JOSE) for web browsers and node. js- based servers. Prior to version 2. 2. 0 when using the non- default " fallback" crypto back- end ECC operations in ` node- jose` can trigger a Denial- of- Service ( DoS) condition due to a possible infinite loop in an internal calculation. For some ECC operations this condition is triggered randomly; for others it can be triggered by malicious input. The issue has been patched in version 2. 2. 0. Since this issue is only present in the " fallback" crypto implementation it can be avoided by ensuring that either WebCrypto or the Node ` crypto` module is available in the JS environment where ` node- jose` is being run
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] node - j ##ose is a JavaScript implementation of the JSON Object Sign ##ing and Encryption ( J ##OS ##E ) for web browsers and node . js - based servers . Prior to version 2 . 2 . 0 when using the non-default " fallback " crypto back-end ECC operations in ` node - j ##ose ` can trigger a Denial-of-Service ( DoS ) condition due to a p ##o ssi b ##le in ##f init e loop in an int er ##nal calculation . For some ECC operations this condition is triggered randomly ; for others it can be triggered by malicious input . The issue has been patched in version 2 . 2 . 0 . Since this issue is only present in the " fallback " crypto implementation it can be avoided by en ##s uri ng that either Web Crypto or the Node ` crypto ` mod ul ##e is available in the JS environment where ` node - j ##ose ` is being run . [SEP]
LRP (+Pred, pos-only)
[CLS] node - j ##ose is a JavaScript implementation of the JSON Object Sign ##ing and Encryption ( J ##OS ##E ) for web browsers and node . js - based servers . Prior to version 2 . 2 . 0 when using the non-default " fallback " crypto back-end ECC operations in ` node - j ##ose ` can trigger a Denial-of-Service ( DoS ) condition due to a p ##o ssi b ##le in ##f init e loop in an int er ##nal calculation . For some ECC operations this condition is triggered randomly ; for others it can be triggered by malicious input . The issue has been patched in version 2 . 2 . 0 . Since this issue is only present in the " fallback " crypto implementation it can be avoided by en ##s uri ng that either Web Crypto or the Node ` crypto ` mod ul ##e is available in the JS environment where ` node - j ##ose ` is being run . [SEP]
LIME (words)
node-jose is a JavaScript implementation of the JSON Object Signing and Encryption (JOSE) for web browsers and node.js-based servers. Prior to version 2.2.0 when using the non-default "fallback" crypto back-end ECC operations in `node-jose` can trigger a Denial-of-Service (DoS) condition due to a possible infinite loop in an internal calculation. For some ECC operations this condition is triggered randomly; for others it can be triggered by malicious input. The issue has been patched in version 2.2.0. Since this issue is only present in the "fallback" crypto implementation it can be avoided by ensuring that either WebCrypto or the Node `crypto` module is available in the JS environment where `node-jose` is being run.
SHAP (words)
node- jose is a JavaScript implementation of the JSON Object Signing and Encryption ( JOSE) for web browsers and node. js- based servers. Prior to version 2. 2. 0 when using the non- default " fallback" crypto back- end ECC operations in ` node- jose` can trigger a Denial- of- Service ( DoS) condition due to a possible infinite loop in an internal calculation. For some ECC operations this condition is triggered randomly; for others it can be triggered by malicious input. The issue has been patched in version 2. 2. 0. Since this issue is only present in the " fallback" crypto implementation it can be avoided by ensuring that either WebCrypto or the Node ` crypto` module is available in the JS environment where ` node- jose` is being run
#8 · cve_id CVE-2020-12262 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
Intelbras ▁T IP 200 ▁60 . 61 . 75 . 15 ▁T IP 200 L ITE ▁60 . 61 . 75 . 15 ▁and ▁T IP 300 ▁65 . 61 . 75 . 15 ▁devices ▁allow / c gi - bin / c gi Serv er . ex x ? page = XSS . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
Intelbras TIP200 60.61.75.15 TIP200LITE 60.61.75.15 and TIP300 65.61.75.15 devices allow /cgi-bin/cgiServer.exx?page= XSS.
SHAP (words)
Intelbras TIP200 60. 61. 75. 15 TIP200LITE 60. 61. 75. 15 and TIP300 65. 61. 75. 15 devices allow / cgi- bin/ cgiServer. exx? page= XSS
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Intelbras T ##IP ##20 ##0 60 . 61 . 75 . 15 T ##IP ##20 ##0 ##L ##IT ##E 60 . 61 . 75 . 15 and T ##IP ##30 ##0 65 . 61 . 75 . 15 dev ice ##s allow / c ##gi - bin / c ##gi ##S ##erve ##r . ex ##x ? page = XSS . [SEP]
LRP (+Pred, pos-only)
[CLS] Intelbras T ##IP ##20 ##0 60 . 61 . 75 . 15 T ##IP ##20 ##0 ##L ##IT ##E 60 . 61 . 75 . 15 and T ##IP ##30 ##0 65 . 61 . 75 . 15 dev ice ##s allow / c ##gi - bin / c ##gi ##S ##erve ##r . ex ##x ? page = XSS . [SEP]
LIME (words)
Intelbras TIP200 60.61.75.15 TIP200LITE 60.61.75.15 and TIP300 65.61.75.15 devices allow /cgi-bin/cgiServer.exx?page= XSS.
SHAP (words)
Intelbras TIP200 60. 61. 75. 15 TIP200LITE 60. 61. 75. 15 and TIP300 65. 61. 75. 15 devices allow / cgi- bin/ cgiServer. exx? page= XSS
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Intelbras T ##IP ##20 ##0 60 . 61 . 75 . 15 T ##IP ##20 ##0 ##L ##IT ##E 60 . 61 . 75 . 15 and T ##IP ##30 ##0 65 . 61 . 75 . 15 dev ice ##s allow / c ##gi - bin / c ##gi ##S ##erve ##r . ex ##x ? page = XSS . [SEP]
LRP (+Pred, pos-only)
[CLS] Intelbras T ##IP ##20 ##0 60 . 61 . 75 . 15 T ##IP ##20 ##0 ##L ##IT ##E 60 . 61 . 75 . 15 and T ##IP ##30 ##0 65 . 61 . 75 . 15 dev ice ##s allow / c ##gi - bin / c ##gi ##S ##erve ##r . ex ##x ? page = XSS . [SEP]
LIME (words)
Intelbras TIP200 60.61.75.15 TIP200LITE 60.61.75.15 and TIP300 65.61.75.15 devices allow /cgi-bin/cgiServer.exx?page= XSS.
SHAP (words)
Intelbras TIP200 60. 61. 75. 15 TIP200LITE 60. 61. 75. 15 and TIP300 65. 61. 75. 15 devices allow / cgi- bin/ cgiServer. exx? page= XSS
#9 · cve_id CVE-2022-38512 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁The ▁Tran sl ation ▁module ▁in Liferay ▁Portal ▁v 7 . 4 . 3 . 12 ▁through ▁v 7 . 4 . 3 . 36 ▁and Liferay DXP ▁7 . 4 ▁update ▁8 ▁through ▁36 ▁does ▁not ▁check permissions ▁before ▁allowing ▁a ▁user ▁to ▁export ▁a ▁web ▁content ▁for tran sl ation ▁allowing ▁attackers ▁to ▁download ▁a ▁web ▁content ▁page ' s XL IFF tran sl ation ▁file ▁via ▁crafted URL . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
The Translation module in Liferay Portal v7.4.3.12 through v7.4.3.36 and Liferay DXP 7.4 update 8 through 36 does not check permissions before allowing a user to export a web content for translation allowing attackers to download a web content page's XLIFF translation file via crafted URL.
SHAP (words)
The Translation module in Liferay Portal v7. 4. 3. 12 through v7. 4. 3. 36 and Liferay DXP 7. 4 update 8 through 36 does not check permissions before allowing a user to export a web content for translation allowing attackers to download a web content page' s XLIFF translation file via crafted URL
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] The T ##ran sl at ##ion mod ul ##e in Liferay Portal v ##7 . 4 . 3 . 12 through v ##7 . 4 . 3 . 36 and Liferay DXP 7 . 4 update 8 through 36 does not check permissions before allowing a user to export a web content for t ##ran sl at ##ion allowing attackers to download a web content page ' s XL IF ##F t ##ran sl at ##ion file via crafted URL . [SEP]
LRP (+Pred, pos-only)
[CLS] The T ##ran sl at ##ion mod ul ##e in Liferay Portal v ##7 . 4 . 3 . 12 through v ##7 . 4 . 3 . 36 and Liferay DXP 7 . 4 update 8 through 36 does not check permissions before allowing a user to export a web content for t ##ran sl at ##ion allowing attackers to download a web content page ' s XL IF ##F t ##ran sl at ##ion file via crafted URL . [SEP]
LIME (words)
The Translation module in Liferay Portal v7.4.3.12 through v7.4.3.36 and Liferay DXP 7.4 update 8 through 36 does not check permissions before allowing a user to export a web content for translation allowing attackers to download a web content page's XLIFF translation file via crafted URL.
SHAP (words)
The Translation module in Liferay Portal v7. 4. 3. 12 through v7. 4. 3. 36 and Liferay DXP 7. 4 update 8 through 36 does not check permissions before allowing a user to export a web content for translation allowing attackers to download a web content page' s XLIFF translation file via crafted URL
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] The T ##ran sl at ##ion mod ul ##e in Liferay Portal v ##7 . 4 . 3 . 12 through v ##7 . 4 . 3 . 36 and Liferay DXP 7 . 4 update 8 through 36 does not check permissions before allowing a user to export a web content for t ##ran sl at ##ion allowing attackers to download a web content page ' s XL IF ##F t ##ran sl at ##ion file via crafted URL . [SEP]
LRP (+Pred, pos-only)
[CLS] The T ##ran sl at ##ion mod ul ##e in Liferay Portal v ##7 . 4 . 3 . 12 through v ##7 . 4 . 3 . 36 and Liferay DXP 7 . 4 update 8 through 36 does not check permissions before allowing a user to export a web content for t ##ran sl at ##ion allowing attackers to download a web content page ' s XL IF ##F t ##ran sl at ##ion file via crafted URL . [SEP]
LIME (words)
The Translation module in Liferay Portal v7.4.3.12 through v7.4.3.36 and Liferay DXP 7.4 update 8 through 36 does not check permissions before allowing a user to export a web content for translation allowing attackers to download a web content page's XLIFF translation file via crafted URL.
SHAP (words)
The Translation module in Liferay Portal v7. 4. 3. 12 through v7. 4. 3. 36 and Liferay DXP 7. 4 update 8 through 36 does not check permissions before allowing a user to export a web content for translation allowing attackers to download a web content page' s XLIFF translation file via crafted URL
#10 · cve_id CVE-2021-0383 · av
GT=LOCAL (2)
xlnet · Pred=LOCAL (2) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁In ▁done ▁of Captive ▁Portal Login Activity . java ▁there ▁is ▁a confuse d ▁deputy . ▁This ▁could ▁lead ▁to ▁local escalation ▁of ▁privilege ▁in ▁carrier ▁settings ▁with ▁no ▁additional ▁execution ▁privileges ▁needed . User ▁interaction ▁is ▁not ▁needed ▁for ▁exploitation . Pro duct : ▁Android Versions : ▁Android - 11 And roid ▁ID : ▁A - 160 87 10 56 <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
In done of CaptivePortalLoginActivity.java there is a confused deputy. This could lead to local escalation of privilege in carrier settings with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-160871056
SHAP (words)
In done of CaptivePortalLoginActivity. java there is a confused deputy. This could lead to local escalation of privilege in carrier settings with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android- 11Android ID: A- 160871056
lrp-bert · Pred=LOCAL (2) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] In done of Captive Portal Login Activity . java there is a confuse d deputy . This could lead to local escalation of privilege in carrier settings with no additional exec u ##tion privileges needed . User int era ##ction is not needed for exploitation . Product : Android Versions : Android - 11 ##A ##nd ##roid ID : A - 160 ##8 ##7 ##10 ##5 ##6 [SEP]
LRP (+Pred, pos-only)
[CLS] In done of Captive Portal Login Activity . java there is a confuse d deputy . This could lead to local escalation of privilege in carrier settings with no additional exec u ##tion privileges needed . User int era ##ction is not needed for exploitation . Product : Android Versions : Android - 11 ##A ##nd ##roid ID : A - 160 ##8 ##7 ##10 ##5 ##6 [SEP]
LIME (words)
In done of CaptivePortalLoginActivity.java there is a confused deputy. This could lead to local escalation of privilege in carrier settings with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-160871056
SHAP (words)
In done of CaptivePortalLoginActivity. java there is a confused deputy. This could lead to local escalation of privilege in carrier settings with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android- 11Android ID: A- 160871056
lrp-distilbert · Pred=LOCAL (2) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] In done of Captive Portal Login Activity . java there is a confuse d deputy . This could lead to local escalation of privilege in carrier settings with no additional exec u ##tion privileges needed . User int era ##ction is not needed for exploitation . Product : Android Versions : Android - 11 ##A ##nd ##roid ID : A - 160 ##8 ##7 ##10 ##5 ##6 [SEP]
LRP (+Pred, pos-only)
[CLS] In done of Captive Portal Login Activity . java there is a confuse d deputy . This could lead to local escalation of privilege in carrier settings with no additional exec u ##tion privileges needed . User int era ##ction is not needed for exploitation . Product : Android Versions : Android - 11 ##A ##nd ##roid ID : A - 160 ##8 ##7 ##10 ##5 ##6 [SEP]
LIME (words)
In done of CaptivePortalLoginActivity.java there is a confused deputy. This could lead to local escalation of privilege in carrier settings with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-160871056
SHAP (words)
In done of CaptivePortalLoginActivity. java there is a confused deputy. This could lead to local escalation of privilege in carrier settings with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android- 11Android ID: A- 160871056
#11 · cve_id CVE-2022-20483 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁In ▁several ▁functions ▁that parse av rc ▁response ▁in av rc _ par s _ ct . cc ▁and ▁related ▁files ▁there ▁are ▁po ssi ble ▁out ▁of ▁bound s ▁reads ▁due ▁to ▁integer overflows . ▁This ▁could ▁lead ▁to ▁remote ▁in for matio n ▁di sc los ure ▁with ▁no ▁additional ▁execution ▁privileges ▁needed . User ▁interaction ▁is ▁not ▁needed ▁for ▁exploitation . Pro duct : ▁Android Versions : ▁Android - 10 ▁Android - 11 ▁Android - 12 ▁Android - 12 L ▁Android - 13 And roid ▁ID : ▁A - 24 24 59 12 6 <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
In several functions that parse avrc response in avrc_pars_ct.cc and related files there are possible out of bounds reads due to integer overflows. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-242459126
SHAP (words)
In several functions that parse avrc response in avrc_pars_ct. cc and related files there are possible out of bounds reads due to integer overflows. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android- 10 Android- 11 Android- 12 Android- 12L Android- 13Android ID: A- 242459126
lrp-bert · Pred=NETWORK (0) · p=0.99 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] In several functions that parse a ##v ##rc response in a ##v ##rc _ par ##s _ c ##t . cc and related files there are p ##o ssi b ##le out of bounds reads due to int e ##ger overflows . This could lead to remote info ##r matio n di sc los ##ure with no additional exec u ##tion privileges needed . User int era ##ction is not needed for exploitation . Product : Android Versions : Android - 10 Android - 11 Android - 12 Android - 12 ##L Android - 13 ##A ##nd ##roid ID : A - 242 ##45 ##9 ##12 ##6 [SEP]
LRP (+Pred, pos-only)
[CLS] In several functions that parse a ##v ##rc response in a ##v ##rc _ par ##s _ c ##t . cc and related files there are p ##o ssi b ##le out of bounds reads due to int e ##ger overflows . This could lead to remote info ##r matio n di sc los ##ure with no additional exec u ##tion privileges needed . User int era ##ction is not needed for exploitation . Product : Android Versions : Android - 10 Android - 11 Android - 12 Android - 12 ##L Android - 13 ##A ##nd ##roid ID : A - 242 ##45 ##9 ##12 ##6 [SEP]
LIME (words)
In several functions that parse avrc response in avrc_pars_ct.cc and related files there are possible out of bounds reads due to integer overflows. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-242459126
SHAP (words)
In several functions that parse avrc response in avrc_pars_ct. cc and related files there are possible out of bounds reads due to integer overflows. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android- 10 Android- 11 Android- 12 Android- 12L Android- 13Android ID: A- 242459126
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] In several functions that parse a ##v ##rc response in a ##v ##rc _ par ##s _ c ##t . cc and related files there are p ##o ssi b ##le out of bounds reads due to int e ##ger overflows . This could lead to remote info ##r matio n di sc los ##ure with no additional exec u ##tion privileges needed . User int era ##ction is not needed for exploitation . Product : Android Versions : Android - 10 Android - 11 Android - 12 Android - 12 ##L Android - 13 ##A ##nd ##roid ID : A - 242 ##45 ##9 ##12 ##6 [SEP]
LRP (+Pred, pos-only)
[CLS] In several functions that parse a ##v ##rc response in a ##v ##rc _ par ##s _ c ##t . cc and related files there are p ##o ssi b ##le out of bounds reads due to int e ##ger overflows . This could lead to remote info ##r matio n di sc los ##ure with no additional exec u ##tion privileges needed . User int era ##ction is not needed for exploitation . Product : Android Versions : Android - 10 Android - 11 Android - 12 Android - 12 ##L Android - 13 ##A ##nd ##roid ID : A - 242 ##45 ##9 ##12 ##6 [SEP]
LIME (words)
In several functions that parse avrc response in avrc_pars_ct.cc and related files there are possible out of bounds reads due to integer overflows. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-242459126
SHAP (words)
In several functions that parse avrc response in avrc_pars_ct. cc and related files there are possible out of bounds reads due to integer overflows. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android- 10 Android- 11 Android- 12 Android- 12L Android- 13Android ID: A- 242459126
#12 · cve_id CVE-2022-30304 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁An improper neutralization ▁of ▁input ▁during ▁web ▁page ▁generation ▁vulnerability ▁[ C WE - 79 ] ▁in FortiAnalyzer ▁versions ▁prior ▁to ▁7 . 2 . 1 ▁7 . 0 . 4 ▁and ▁6 . 4 . 8 ▁may ▁allow ▁a ▁remote unauthenticated ▁attacker ▁to ▁perform ▁a ▁stored ▁cross ▁site scripting ( XSS ) ▁attack ▁via ▁the URL param eter ▁observed ▁in ▁the FortiWeb ▁attack ▁event ▁log view ▁in FortiAnalyzer . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
An improper neutralization of input during web page generation vulnerability [CWE-79] in FortiAnalyzer versions prior to 7.2.1 7.0.4 and 6.4.8 may allow a remote unauthenticated attacker to perform a stored cross site scripting (XSS) attack via the URL parameter observed in the FortiWeb attack event logview in FortiAnalyzer.
SHAP (words)
An improper neutralization of input during web page generation vulnerability [ CWE- 79] in FortiAnalyzer versions prior to 7. 2. 1 7. 0. 4 and 6. 4. 8 may allow a remote unauthenticated attacker to perform a stored cross site scripting ( XSS) attack via the URL parameter observed in the FortiWeb attack event logview in FortiAnalyzer
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] An improper neutralization of input d uri ng web page generation vulnerability [ CW ##E - 79 ] in FortiAnalyzer versions prior to 7 . 2 . 1 7 . 0 . 4 and 6 . 4 . 8 may allow a remote unauthenticated attacker to perform a stored cross s ite scripting ( XSS ) attack via the URL param et ##er observed in the FortiWeb attack event log ##view in FortiAnalyzer . [SEP]
LRP (+Pred, pos-only)
[CLS] An improper neutralization of input d uri ng web page generation vulnerability [ CW ##E - 79 ] in FortiAnalyzer versions prior to 7 . 2 . 1 7 . 0 . 4 and 6 . 4 . 8 may allow a remote unauthenticated attacker to perform a stored cross s ite scripting ( XSS ) attack via the URL param et ##er observed in the FortiWeb attack event log ##view in FortiAnalyzer . [SEP]
LIME (words)
An improper neutralization of input during web page generation vulnerability [CWE-79] in FortiAnalyzer versions prior to 7.2.1 7.0.4 and 6.4.8 may allow a remote unauthenticated attacker to perform a stored cross site scripting (XSS) attack via the URL parameter observed in the FortiWeb attack event logview in FortiAnalyzer.
SHAP (words)
An improper neutralization of input during web page generation vulnerability [ CWE- 79] in FortiAnalyzer versions prior to 7. 2. 1 7. 0. 4 and 6. 4. 8 may allow a remote unauthenticated attacker to perform a stored cross site scripting ( XSS) attack via the URL parameter observed in the FortiWeb attack event logview in FortiAnalyzer
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] An improper neutralization of input d uri ng web page generation vulnerability [ CW ##E - 79 ] in FortiAnalyzer versions prior to 7 . 2 . 1 7 . 0 . 4 and 6 . 4 . 8 may allow a remote unauthenticated attacker to perform a stored cross s ite scripting ( XSS ) attack via the URL param et ##er observed in the FortiWeb attack event log ##view in FortiAnalyzer . [SEP]
LRP (+Pred, pos-only)
[CLS] An improper neutralization of input d uri ng web page generation vulnerability [ CW ##E - 79 ] in FortiAnalyzer versions prior to 7 . 2 . 1 7 . 0 . 4 and 6 . 4 . 8 may allow a remote unauthenticated attacker to perform a stored cross s ite scripting ( XSS ) attack via the URL param et ##er observed in the FortiWeb attack event log ##view in FortiAnalyzer . [SEP]
LIME (words)
An improper neutralization of input during web page generation vulnerability [CWE-79] in FortiAnalyzer versions prior to 7.2.1 7.0.4 and 6.4.8 may allow a remote unauthenticated attacker to perform a stored cross site scripting (XSS) attack via the URL parameter observed in the FortiWeb attack event logview in FortiAnalyzer.
SHAP (words)
An improper neutralization of input during web page generation vulnerability [ CWE- 79] in FortiAnalyzer versions prior to 7. 2. 1 7. 0. 4 and 6. 4. 8 may allow a remote unauthenticated attacker to perform a stored cross site scripting ( XSS) attack via the URL parameter observed in the FortiWeb attack event logview in FortiAnalyzer
#13 · cve_id CVE-2022-46771 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁IBM UrbanCode Deploy ( UC D ) ▁6 . 2 . 0 . 0 ▁through ▁6 . 2 . 7 . 18 ▁7 . 0 . 5 . 0 ▁through ▁7 . 0 . 5 . 13 ▁7 . 1 . 0 . 0 ▁through ▁7 . 1 . 2 . 9 ▁7 . 2 . 0 . 0 ▁through ▁7 . 2 . 3 . 2 ▁and ▁7 . 3 . 0 . 0 ▁is ▁vulnerable ▁to cross-site scripting . ▁This ▁vulnerability ▁allows ▁users ▁to embed ▁arbitrary JavaScript ▁code ▁in ▁the ▁Web UI ▁thus ▁alter ing ▁the ▁intended ▁functionality ▁potentially ▁leading ▁to credential s ▁di sc los ure ▁within ▁a ▁trusted se ssi ▁on . ▁IBM X-Force ▁ID : ▁24 227 3 . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
IBM UrbanCode Deploy (UCD) 6.2.0.0 through 6.2.7.18 7.0.5.0 through 7.0.5.13 7.1.0.0 through 7.1.2.9 7.2.0.0 through 7.2.3.2 and 7.3.0.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 242273.
SHAP (words)
IBM UrbanCode Deploy ( UCD) 6. 2. 0. 0 through 6. 2. 7. 18 7. 0. 5. 0 through 7. 0. 5. 13 7. 1. 0. 0 through 7. 1. 2. 9 7. 2. 0. 0 through 7. 2. 3. 2 and 7. 3. 0. 0 is vulnerable to cross- site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X- Force ID: 242273
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] I BM UrbanCode Deploy ( UC ##D ) 6 . 2 . 0 . 0 through 6 . 2 . 7 . 18 7 . 0 . 5 . 0 through 7 . 0 . 5 . 13 7 . 1 . 0 . 0 through 7 . 1 . 2 . 9 7 . 2 . 0 . 0 through 7 . 2 . 3 . 2 and 7 . 3 . 0 . 0 is vulnerable to cross-site scripting . This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the int ended functionality potentially leading to credential s di sc los ##ure within a trusted se ssi on . I BM X-Force ID : 242 ##27 ##3 . [SEP]
LRP (+Pred, pos-only)
[CLS] I BM UrbanCode Deploy ( UC ##D ) 6 . 2 . 0 . 0 through 6 . 2 . 7 . 18 7 . 0 . 5 . 0 through 7 . 0 . 5 . 13 7 . 1 . 0 . 0 through 7 . 1 . 2 . 9 7 . 2 . 0 . 0 through 7 . 2 . 3 . 2 and 7 . 3 . 0 . 0 is vulnerable to cross-site scripting . This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the int ended functionality potentially leading to credential s di sc los ##ure within a trusted se ssi on . I BM X-Force ID : 242 ##27 ##3 . [SEP]
LIME (words)
IBM UrbanCode Deploy (UCD) 6.2.0.0 through 6.2.7.18 7.0.5.0 through 7.0.5.13 7.1.0.0 through 7.1.2.9 7.2.0.0 through 7.2.3.2 and 7.3.0.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 242273.
SHAP (words)
IBM UrbanCode Deploy ( UCD) 6. 2. 0. 0 through 6. 2. 7. 18 7. 0. 5. 0 through 7. 0. 5. 13 7. 1. 0. 0 through 7. 1. 2. 9 7. 2. 0. 0 through 7. 2. 3. 2 and 7. 3. 0. 0 is vulnerable to cross- site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X- Force ID: 242273
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] I BM UrbanCode Deploy ( UC ##D ) 6 . 2 . 0 . 0 through 6 . 2 . 7 . 18 7 . 0 . 5 . 0 through 7 . 0 . 5 . 13 7 . 1 . 0 . 0 through 7 . 1 . 2 . 9 7 . 2 . 0 . 0 through 7 . 2 . 3 . 2 and 7 . 3 . 0 . 0 is vulnerable to cross-site scripting . This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the int ended functionality potentially leading to credential s di sc los ##ure within a trusted se ssi on . I BM X-Force ID : 242 ##27 ##3 . [SEP]
LRP (+Pred, pos-only)
[CLS] I BM UrbanCode Deploy ( UC ##D ) 6 . 2 . 0 . 0 through 6 . 2 . 7 . 18 7 . 0 . 5 . 0 through 7 . 0 . 5 . 13 7 . 1 . 0 . 0 through 7 . 1 . 2 . 9 7 . 2 . 0 . 0 through 7 . 2 . 3 . 2 and 7 . 3 . 0 . 0 is vulnerable to cross-site scripting . This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the int ended functionality potentially leading to credential s di sc los ##ure within a trusted se ssi on . I BM X-Force ID : 242 ##27 ##3 . [SEP]
LIME (words)
IBM UrbanCode Deploy (UCD) 6.2.0.0 through 6.2.7.18 7.0.5.0 through 7.0.5.13 7.1.0.0 through 7.1.2.9 7.2.0.0 through 7.2.3.2 and 7.3.0.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 242273.
SHAP (words)
IBM UrbanCode Deploy ( UCD) 6. 2. 0. 0 through 6. 2. 7. 18 7. 0. 5. 0 through 7. 0. 5. 13 7. 1. 0. 0 through 7. 1. 2. 9 7. 2. 0. 0 through 7. 2. 3. 2 and 7. 3. 0. 0 is vulnerable to cross- site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X- Force ID: 242273
#14 · cve_id CVE-2021-31941 · av
GT=LOCAL (2)
xlnet · Pred=LOCAL (2) · p=0.99 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁Microsoft ▁Office Graphics Remote ▁Code Execution Vulnerability <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
Microsoft Office Graphics Remote Code Execution Vulnerability
SHAP (words)
Microsoft Office Graphics Remote Code Execution Vulnerability
lrp-bert · Pred=LOCAL (2) · p=0.99 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Microsoft Office Graphics Remote Code Execution Vulnerability [SEP]
LRP (+Pred, pos-only)
[CLS] Microsoft Office Graphics Remote Code Execution Vulnerability [SEP]
LIME (words)
Microsoft Office Graphics Remote Code Execution Vulnerability
SHAP (words)
Microsoft Office Graphics Remote Code Execution Vulnerability
lrp-distilbert · Pred=LOCAL (2) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Microsoft Office Graphics Remote Code Execution Vulnerability [SEP]
LRP (+Pred, pos-only)
[CLS] Microsoft Office Graphics Remote Code Execution Vulnerability [SEP]
LIME (words)
Microsoft Office Graphics Remote Code Execution Vulnerability
SHAP (words)
Microsoft Office Graphics Remote Code Execution Vulnerability
#15 · cve_id CVE-2019-15441 · av
GT=LOCAL (2)
xlnet · Pred=LOCAL (2) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁The ▁Samsung ▁on 7 x el tel g t ▁Android ▁device ▁with ▁a ▁build fingerprint ▁of sam s ung / on 7 x el tel g t / on 7 x el tel g t : 8 . 1 . 0 / M 1 A J Q / G 6 10 L K LU 2 C SB 1 : user / release - key s ▁contains ▁a pre-installed ▁app ▁with ▁a ▁package ▁name ▁of ▁com . sam s ung . android . the me center ▁app ( version Co de = 7 000 100 ▁version Name = 7 . 0 . 1 . 0 ) ▁that ▁allows ▁other pre-installed ▁apps ▁to ▁perform ▁app ▁installation ▁via ▁an acce ssi ble ▁app ▁component . ▁This ▁capability ▁can ▁be ▁accessed ▁by ▁any pre-installed ▁app ▁on ▁the ▁device ▁which ▁can ▁obtain signatureOrSystem permissions ▁that ▁are ▁required ▁by ▁other ▁other pre-installed ▁apps ▁that ▁exported ▁their ▁capabilities ▁to ▁other pre-installed ▁app . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
The Samsung on7xeltelgt Android device with a build fingerprint of samsung/on7xeltelgt/on7xeltelgt:8.1.0/M1AJQ/G610LKLU2CSB1:user/release-keys contains a pre-installed app with a package name of com.samsung.android.themecenter app (versionCode=7000100 versionName=7.0.1.0) that allows other pre-installed apps to perform app installation via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app.
SHAP (words)
The Samsung on7xeltelgt Android device with a build fingerprint of samsung/ on7xeltelgt/ on7xeltelgt: 8. 1. 0/ M1AJQ/ G610LKLU2CSB1: user/ release- keys contains a pre- installed app with a package name of com. samsung. android. themecenter app ( versionCode= 7000100 versionName= 7. 0. 1. 0) that allows other pre- installed apps to perform app installation via an accessible app component. This capability can be accessed by any pre- installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre- installed apps that exported their capabilities to other pre- installed app
lrp-bert · Pred=LOCAL (2) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] The Samsung on ##7 ##xe ##lt ##el ##gt Android dev ice with a build fingerprint of sa ##ms ##ung / on ##7 ##xe ##lt ##el ##gt / on ##7 ##xe ##lt ##el ##gt : 8 . 1 . 0 / M1 ##A ##J ##Q / G ##6 ##10 ##L ##K ##L ##U ##2 ##CS ##B ##1 : user / release - keys contains a pre-installed app with a package name of com . sa ##ms ##ung . android . theme ##cent ##er app ( version ##C ##ode = 700 ##01 ##00 version ##N ##ame = 7 . 0 . 1 . 0 ) that allows other pre-installed apps to perform app installation via an a ##cc ##e ssi b ##le app component . This capability can be accessed by any pre-installed app on the dev ice which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app . [SEP]
LRP (+Pred, pos-only)
[CLS] The Samsung on ##7 ##xe ##lt ##el ##gt Android dev ice with a build fingerprint of sa ##ms ##ung / on ##7 ##xe ##lt ##el ##gt / on ##7 ##xe ##lt ##el ##gt : 8 . 1 . 0 / M1 ##A ##J ##Q / G ##6 ##10 ##L ##K ##L ##U ##2 ##CS ##B ##1 : user / release - keys contains a pre-installed app with a package name of com . sa ##ms ##ung . android . theme ##cent ##er app ( version ##C ##ode = 700 ##01 ##00 version ##N ##ame = 7 . 0 . 1 . 0 ) that allows other pre-installed apps to perform app installation via an a ##cc ##e ssi b ##le app component . This capability can be accessed by any pre-installed app on the dev ice which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app . [SEP]
LIME (words)
The Samsung on7xeltelgt Android device with a build fingerprint of samsung/on7xeltelgt/on7xeltelgt:8.1.0/M1AJQ/G610LKLU2CSB1:user/release-keys contains a pre-installed app with a package name of com.samsung.android.themecenter app (versionCode=7000100 versionName=7.0.1.0) that allows other pre-installed apps to perform app installation via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app.
SHAP (words)
The Samsung on7xeltelgt Android device with a build fingerprint of samsung/ on7xeltelgt/ on7xeltelgt: 8. 1. 0/ M1AJQ/ G610LKLU2CSB1: user/ release- keys contains a pre- installed app with a package name of com. samsung. android. themecenter app ( versionCode= 7000100 versionName= 7. 0. 1. 0) that allows other pre- installed apps to perform app installation via an accessible app component. This capability can be accessed by any pre- installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre- installed apps that exported their capabilities to other pre- installed app
lrp-distilbert · Pred=LOCAL (2) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] The Samsung on ##7 ##xe ##lt ##el ##gt Android dev ice with a build fingerprint of sa ##ms ##ung / on ##7 ##xe ##lt ##el ##gt / on ##7 ##xe ##lt ##el ##gt : 8 . 1 . 0 / M1 ##A ##J ##Q / G ##6 ##10 ##L ##K ##L ##U ##2 ##CS ##B ##1 : user / release - keys contains a pre-installed app with a package name of com . sa ##ms ##ung . android . theme ##cent ##er app ( version ##C ##ode = 700 ##01 ##00 version ##N ##ame = 7 . 0 . 1 . 0 ) that allows other pre-installed apps to perform app installation via an a ##cc ##e ssi b ##le app component . This capability can be accessed by any pre-installed app on the dev ice which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app . [SEP]
LRP (+Pred, pos-only)
[CLS] The Samsung on ##7 ##xe ##lt ##el ##gt Android dev ice with a build fingerprint of sa ##ms ##ung / on ##7 ##xe ##lt ##el ##gt / on ##7 ##xe ##lt ##el ##gt : 8 . 1 . 0 / M1 ##A ##J ##Q / G ##6 ##10 ##L ##K ##L ##U ##2 ##CS ##B ##1 : user / release - keys contains a pre-installed app with a package name of com . sa ##ms ##ung . android . theme ##cent ##er app ( version ##C ##ode = 700 ##01 ##00 version ##N ##ame = 7 . 0 . 1 . 0 ) that allows other pre-installed apps to perform app installation via an a ##cc ##e ssi b ##le app component . This capability can be accessed by any pre-installed app on the dev ice which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app . [SEP]
LIME (words)
The Samsung on7xeltelgt Android device with a build fingerprint of samsung/on7xeltelgt/on7xeltelgt:8.1.0/M1AJQ/G610LKLU2CSB1:user/release-keys contains a pre-installed app with a package name of com.samsung.android.themecenter app (versionCode=7000100 versionName=7.0.1.0) that allows other pre-installed apps to perform app installation via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app.
SHAP (words)
The Samsung on7xeltelgt Android device with a build fingerprint of samsung/ on7xeltelgt/ on7xeltelgt: 8. 1. 0/ M1AJQ/ G610LKLU2CSB1: user/ release- keys contains a pre- installed app with a package name of com. samsung. android. themecenter app ( versionCode= 7000100 versionName= 7. 0. 1. 0) that allows other pre- installed apps to perform app installation via an accessible app component. This capability can be accessed by any pre- installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre- installed apps that exported their capabilities to other pre- installed app
#16 · cve_id CVE-2023-36363 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁An ▁issue ▁in ▁the ▁_ _ ns s _ data base _ lookup ▁component ▁of ▁Mo net DB ▁Server ▁v 11 . 45 . 17 ▁and ▁v 11 . 46 . 0 ▁allows ▁attackers ▁to ▁cause ▁a Denial ▁of ▁Service ( DoS ) ▁via ▁crafted SQL ▁statements . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
An issue in the __nss_database_lookup component of MonetDB Server v11.45.17 and v11.46.0 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
SHAP (words)
An issue in the __nss_database_lookup component of MonetDB Server v11. 45. 17 and v11. 46. 0 allows attackers to cause a Denial of Service ( DoS) via crafted SQL statements
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] An issue in the _ _ n ##ss _ da tab as ##e _ lookup component of Mon ##et ##D ##B Server v ##11 . 45 . 17 and v ##11 . 46 . 0 allows attackers to cause a Denial of Service ( DoS ) via crafted SQL statements . [SEP]
LRP (+Pred, pos-only)
[CLS] An issue in the _ _ n ##ss _ da tab as ##e _ lookup component of Mon ##et ##D ##B Server v ##11 . 45 . 17 and v ##11 . 46 . 0 allows attackers to cause a Denial of Service ( DoS ) via crafted SQL statements . [SEP]
LIME (words)
An issue in the __nss_database_lookup component of MonetDB Server v11.45.17 and v11.46.0 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
SHAP (words)
An issue in the __nss_database_lookup component of MonetDB Server v11. 45. 17 and v11. 46. 0 allows attackers to cause a Denial of Service ( DoS) via crafted SQL statements
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] An issue in the _ _ n ##ss _ da tab as ##e _ lookup component of Mon ##et ##D ##B Server v ##11 . 45 . 17 and v ##11 . 46 . 0 allows attackers to cause a Denial of Service ( DoS ) via crafted SQL statements . [SEP]
LRP (+Pred, pos-only)
[CLS] An issue in the _ _ n ##ss _ da tab as ##e _ lookup component of Mon ##et ##D ##B Server v ##11 . 45 . 17 and v ##11 . 46 . 0 allows attackers to cause a Denial of Service ( DoS ) via crafted SQL statements . [SEP]
LIME (words)
An issue in the __nss_database_lookup component of MonetDB Server v11.45.17 and v11.46.0 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
SHAP (words)
An issue in the __nss_database_lookup component of MonetDB Server v11. 45. 17 and v11. 46. 0 allows attackers to cause a Denial of Service ( DoS) via crafted SQL statements
#17 · cve_id CVE-2013-6239 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
Cross-site scripting ( XSS ) ▁vulnerability ▁in ▁the ▁photo ▁gallery ▁model ▁in ▁Ex is ▁Conte xi s ▁before ▁2 . 0 ▁allows ▁remote ▁attackers ▁to inject ▁arbitrary ▁web sc ▁rip t ▁or HTML ▁via ▁the ▁image param eter ▁in ▁a ▁detail ▁action . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
Cross-site scripting (XSS) vulnerability in the photo gallery model in Exis Contexis before 2.0 allows remote attackers to inject arbitrary web script or HTML via the image parameter in a detail action.
SHAP (words)
Cross- site scripting ( XSS) vulnerability in the photo gallery model in Exis Contexis before 2. 0 allows remote attackers to inject arbitrary web script or HTML via the image parameter in a detail action
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Cross-site scripting ( XSS ) vulnerability in the photo gallery mod el in Ex ##is Con ##te ##xi ##s before 2 . 0 allows remote attackers to inject arbitrary web sc r ip t or HTML via the image param et ##er in a detail action . [SEP]
LRP (+Pred, pos-only)
[CLS] Cross-site scripting ( XSS ) vulnerability in the photo gallery mod el in Ex ##is Con ##te ##xi ##s before 2 . 0 allows remote attackers to inject arbitrary web sc r ip t or HTML via the image param et ##er in a detail action . [SEP]
LIME (words)
Cross-site scripting (XSS) vulnerability in the photo gallery model in Exis Contexis before 2.0 allows remote attackers to inject arbitrary web script or HTML via the image parameter in a detail action.
SHAP (words)
Cross- site scripting ( XSS) vulnerability in the photo gallery model in Exis Contexis before 2. 0 allows remote attackers to inject arbitrary web script or HTML via the image parameter in a detail action
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Cross-site scripting ( XSS ) vulnerability in the photo gallery mod el in Ex ##is Con ##te ##xi ##s before 2 . 0 allows remote attackers to inject arbitrary web sc r ip t or HTML via the image param et ##er in a detail action . [SEP]
LRP (+Pred, pos-only)
[CLS] Cross-site scripting ( XSS ) vulnerability in the photo gallery mod el in Ex ##is Con ##te ##xi ##s before 2 . 0 allows remote attackers to inject arbitrary web sc r ip t or HTML via the image param et ##er in a detail action . [SEP]
LIME (words)
Cross-site scripting (XSS) vulnerability in the photo gallery model in Exis Contexis before 2.0 allows remote attackers to inject arbitrary web script or HTML via the image parameter in a detail action.
SHAP (words)
Cross- site scripting ( XSS) vulnerability in the photo gallery model in Exis Contexis before 2. 0 allows remote attackers to inject arbitrary web script or HTML via the image parameter in a detail action
#18 · cve_id CVE-2023-0790 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
Uncaught Exception ▁in GitHub repository th or sten / php my fa q ▁prior ▁to ▁3 . 1 . 11 . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
Uncaught Exception in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
SHAP (words)
Uncaught Exception in GitHub repository thorsten/ phpmyfaq prior to 3. 1. 11
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Uncaught Exception in GitHub repository th ##ors ##ten / php my ##fa ##q prior to 3 . 1 . 11 . [SEP]
LRP (+Pred, pos-only)
[CLS] Uncaught Exception in GitHub repository th ##ors ##ten / php my ##fa ##q prior to 3 . 1 . 11 . [SEP]
LIME (words)
Uncaught Exception in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
SHAP (words)
Uncaught Exception in GitHub repository thorsten/ phpmyfaq prior to 3. 1. 11
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Uncaught Exception in GitHub repository th ##ors ##ten / php my ##fa ##q prior to 3 . 1 . 11 . [SEP]
LRP (+Pred, pos-only)
[CLS] Uncaught Exception in GitHub repository th ##ors ##ten / php my ##fa ##q prior to 3 . 1 . 11 . [SEP]
LIME (words)
Uncaught Exception in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
SHAP (words)
Uncaught Exception in GitHub repository thorsten/ phpmyfaq prior to 3. 1. 11
#19 · cve_id CVE-2021-26829 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁Open PLC Scada BR ▁through ▁0 . 9 . 1 ▁on ▁Linux ▁and ▁through ▁1 . 12 . 4 ▁on ▁Windows ▁allows ▁stored XSS ▁via ▁system _ setting s . sh t m . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
OpenPLC ScadaBR through 0.9.1 on Linux and through 1.12.4 on Windows allows stored XSS via system_settings.shtm.
SHAP (words)
OpenPLC ScadaBR through 0. 9. 1 on Linux and through 1. 12. 4 on Windows allows stored XSS via system_settings. shtm
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Open PLC Scada BR through 0 . 9 . 1 on Linux and through 1 . 12 . 4 on Windows allows stored XSS via system _ settings . s ##ht ##m . [SEP]
LRP (+Pred, pos-only)
[CLS] Open PLC Scada BR through 0 . 9 . 1 on Linux and through 1 . 12 . 4 on Windows allows stored XSS via system _ settings . s ##ht ##m . [SEP]
LIME (words)
OpenPLC ScadaBR through 0.9.1 on Linux and through 1.12.4 on Windows allows stored XSS via system_settings.shtm.
SHAP (words)
OpenPLC ScadaBR through 0. 9. 1 on Linux and through 1. 12. 4 on Windows allows stored XSS via system_settings. shtm
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Open PLC Scada BR through 0 . 9 . 1 on Linux and through 1 . 12 . 4 on Windows allows stored XSS via system _ settings . s ##ht ##m . [SEP]
LRP (+Pred, pos-only)
[CLS] Open PLC Scada BR through 0 . 9 . 1 on Linux and through 1 . 12 . 4 on Windows allows stored XSS via system _ settings . s ##ht ##m . [SEP]
LIME (words)
OpenPLC ScadaBR through 0.9.1 on Linux and through 1.12.4 on Windows allows stored XSS via system_settings.shtm.
SHAP (words)
OpenPLC ScadaBR through 0. 9. 1 on Linux and through 1. 12. 4 on Windows allows stored XSS via system_settings. shtm
#20 · cve_id CVE-2023-3024 · av
GT=ADJACENT_NETWORK (1)
xlnet · Pred=ADJACENT_NETWORK (1) · p=0.97 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁For cing ▁the Bluetooth LE ▁stack ▁to ▁segment ' pre pa re ▁write ▁response ' ▁packet s ▁can ▁lead ▁to ▁an out-of-bounds ▁memory ▁access . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
Forcing the Bluetooth LE stack to segment 'prepare write response' packets can lead to an out-of-bounds memory access.
SHAP (words)
Forcing the Bluetooth LE stack to segment ' prepare write response' packets can lead to an out- of- bounds memory access
lrp-bert · Pred=ADJACENT_NETWORK (1) · p=0.97 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] For ##cing the Bluetooth LE stack to segment ' prepare w ##r ite response ' packets can lead to an out-of-bounds memory access . [SEP]
LRP (+Pred, pos-only)
[CLS] For ##cing the Bluetooth LE stack to segment ' prepare w ##r ite response ' packets can lead to an out-of-bounds memory access . [SEP]
LIME (words)
Forcing the Bluetooth LE stack to segment 'prepare write response' packets can lead to an out-of-bounds memory access.
SHAP (words)
Forcing the Bluetooth LE stack to segment ' prepare write response' packets can lead to an out- of- bounds memory access
lrp-distilbert · Pred=ADJACENT_NETWORK (1) · p=0.99 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] For ##cing the Bluetooth LE stack to segment ' prepare w ##r ite response ' packets can lead to an out-of-bounds memory access . [SEP]
LRP (+Pred, pos-only)
[CLS] For ##cing the Bluetooth LE stack to segment ' prepare w ##r ite response ' packets can lead to an out-of-bounds memory access . [SEP]
LIME (words)
Forcing the Bluetooth LE stack to segment 'prepare write response' packets can lead to an out-of-bounds memory access.
SHAP (words)
Forcing the Bluetooth LE stack to segment ' prepare write response' packets can lead to an out- of- bounds memory access
#21 · cve_id CVE-2020-1469 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁A ▁denial ▁of ▁service ▁vulnerability ▁exists ▁when ▁the . NET ▁implementation ▁of ▁Bond improperly parses ▁input aka ' Bo nd Denial ▁of ▁Service Vulnerability ' . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
A denial of service vulnerability exists when the .NET implementation of Bond improperly parses input aka 'Bond Denial of Service Vulnerability'.
SHAP (words)
A denial of service vulnerability exists when the . NET implementation of Bond improperly parses input aka ' Bond Denial of Service Vulnerability
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] A denial of service vulnerability exists when the . NET implementation of Bond improperly parses input aka ' Bond Denial of Service Vulnerability ' . [SEP]
LRP (+Pred, pos-only)
[CLS] A denial of service vulnerability exists when the . NET implementation of Bond improperly parses input aka ' Bond Denial of Service Vulnerability ' . [SEP]
LIME (words)
A denial of service vulnerability exists when the .NET implementation of Bond improperly parses input aka 'Bond Denial of Service Vulnerability'.
SHAP (words)
A denial of service vulnerability exists when the . NET implementation of Bond improperly parses input aka ' Bond Denial of Service Vulnerability
lrp-distilbert · Pred=NETWORK (0) · p=0.99 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] A denial of service vulnerability exists when the . NET implementation of Bond improperly parses input aka ' Bond Denial of Service Vulnerability ' . [SEP]
LRP (+Pred, pos-only)
[CLS] A denial of service vulnerability exists when the . NET implementation of Bond improperly parses input aka ' Bond Denial of Service Vulnerability ' . [SEP]
LIME (words)
A denial of service vulnerability exists when the .NET implementation of Bond improperly parses input aka 'Bond Denial of Service Vulnerability'.
SHAP (words)
A denial of service vulnerability exists when the . NET implementation of Bond improperly parses input aka ' Bond Denial of Service Vulnerability
#22 · cve_id CVE-2013-2573 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁A ▁Command Injection ▁vulnerability ▁exists ▁in ▁the ap param eter ▁to ▁the / c gi - bin / m ft / wire less _ m ft . c gi ▁file ▁in TP-Link ▁IP Cameras TL - SC ▁31 30 TL - SC ▁31 30 G ▁31 71 G . ▁and ▁41 71 G ▁1 . 6 . 18 P 12 s ▁which ▁could ▁let ▁a malicious ▁user ▁execute ▁arbitrary ▁code . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
A Command Injection vulnerability exists in the ap parameter to the /cgi-bin/mft/wireless_mft.cgi file in TP-Link IP Cameras TL-SC 3130 TL-SC 3130G 3171G. and 4171G 1.6.18P12s which could let a malicious user execute arbitrary code.
SHAP (words)
A Command Injection vulnerability exists in the ap parameter to the / cgi- bin/ mft/ wireless_mft. cgi file in TP- Link IP Cameras TL- SC 3130 TL- SC 3130G 3171G. and 4171G 1. 6. 18P12s which could let a malicious user execute arbitrary code
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] A Command Injection vulnerability exists in the a ##p param et ##er to the / c ##gi - bin / m ##ft / wireless _ m ##ft . c ##gi file in TP-Link IP Cameras T ##L - SC 313 ##0 T ##L - SC 313 ##0 ##G 31 ##7 ##1 ##G . and 41 ##7 ##1 ##G 1 . 6 . 18 ##P ##12 ##s which could let a malicious user exec u ##te arbitrary code . [SEP]
LRP (+Pred, pos-only)
[CLS] A Command Injection vulnerability exists in the a ##p param et ##er to the / c ##gi - bin / m ##ft / wireless _ m ##ft . c ##gi file in TP-Link IP Cameras T ##L - SC 313 ##0 T ##L - SC 313 ##0 ##G 31 ##7 ##1 ##G . and 41 ##7 ##1 ##G 1 . 6 . 18 ##P ##12 ##s which could let a malicious user exec u ##te arbitrary code . [SEP]
LIME (words)
A Command Injection vulnerability exists in the ap parameter to the /cgi-bin/mft/wireless_mft.cgi file in TP-Link IP Cameras TL-SC 3130 TL-SC 3130G 3171G. and 4171G 1.6.18P12s which could let a malicious user execute arbitrary code.
SHAP (words)
A Command Injection vulnerability exists in the ap parameter to the / cgi- bin/ mft/ wireless_mft. cgi file in TP- Link IP Cameras TL- SC 3130 TL- SC 3130G 3171G. and 4171G 1. 6. 18P12s which could let a malicious user execute arbitrary code
lrp-distilbert · Pred=NETWORK (0) · p=0.99 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] A Command Injection vulnerability exists in the a ##p param et ##er to the / c ##gi - bin / m ##ft / wireless _ m ##ft . c ##gi file in TP-Link IP Cameras T ##L - SC 313 ##0 T ##L - SC 313 ##0 ##G 31 ##7 ##1 ##G . and 41 ##7 ##1 ##G 1 . 6 . 18 ##P ##12 ##s which could let a malicious user exec u ##te arbitrary code . [SEP]
LRP (+Pred, pos-only)
[CLS] A Command Injection vulnerability exists in the a ##p param et ##er to the / c ##gi - bin / m ##ft / wireless _ m ##ft . c ##gi file in TP-Link IP Cameras T ##L - SC 313 ##0 T ##L - SC 313 ##0 ##G 31 ##7 ##1 ##G . and 41 ##7 ##1 ##G 1 . 6 . 18 ##P ##12 ##s which could let a malicious user exec u ##te arbitrary code . [SEP]
LIME (words)
A Command Injection vulnerability exists in the ap parameter to the /cgi-bin/mft/wireless_mft.cgi file in TP-Link IP Cameras TL-SC 3130 TL-SC 3130G 3171G. and 4171G 1.6.18P12s which could let a malicious user execute arbitrary code.
SHAP (words)
A Command Injection vulnerability exists in the ap parameter to the / cgi- bin/ mft/ wireless_mft. cgi file in TP- Link IP Cameras TL- SC 3130 TL- SC 3130G 3171G. and 4171G 1. 6. 18P12s which could let a malicious user execute arbitrary code
#23 · cve_id CVE-2021-42663 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁An HTML inject ion ▁vulnerability ▁exists ▁in Sourcecodester ▁Online ▁Event Booking ▁and ▁Reservation ▁System ▁in PHP / MySQL ▁via ▁the msg param eter ▁to / even t - man a gem ent / index . php . ▁An ▁attacker ▁can ▁leverage ▁this ▁vulnerability ▁in ▁order ▁to ▁change ▁the ▁visibility ▁of ▁the ▁website . ▁Once ▁the ▁target ▁user clicks ▁on ▁a ▁given ▁link ▁he ▁will ▁display ▁the ▁content ▁of ▁the HTML ▁code ▁of ▁the ▁attacker ' s ▁choice . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
An HTML injection vulnerability exists in Sourcecodester Online Event Booking and Reservation System in PHP/MySQL via the msg parameter to /event-management/index.php. An attacker can leverage this vulnerability in order to change the visibility of the website. Once the target user clicks on a given link he will display the content of the HTML code of the attacker's choice.
SHAP (words)
An HTML injection vulnerability exists in Sourcecodester Online Event Booking and Reservation System in PHP/ MySQL via the msg parameter to / event- management/ index. php. An attacker can leverage this vulnerability in order to change the visibility of the website. Once the target user clicks on a given link he will display the content of the HTML code of the attacker' s choice
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] An HTML inject ion vulnerability exists in Sourcecodester Online Event Booking and Reservation System in PHP / MySQL via the msg param et ##er to / event - man ##a gem en ##t / index . php . An attacker can leverage this vulnerability in order to change the visibility of the web ##s ite . Once the tar get user clicks on a given link he will display the content of the HTML code of the attacker ' s choice . [SEP]
LRP (+Pred, pos-only)
[CLS] An HTML inject ion vulnerability exists in Sourcecodester Online Event Booking and Reservation System in PHP / MySQL via the msg param et ##er to / event - man ##a gem en ##t / index . php . An attacker can leverage this vulnerability in order to change the visibility of the web ##s ite . Once the tar get user clicks on a given link he will display the content of the HTML code of the attacker ' s choice . [SEP]
LIME (words)
An HTML injection vulnerability exists in Sourcecodester Online Event Booking and Reservation System in PHP/MySQL via the msg parameter to /event-management/index.php. An attacker can leverage this vulnerability in order to change the visibility of the website. Once the target user clicks on a given link he will display the content of the HTML code of the attacker's choice.
SHAP (words)
An HTML injection vulnerability exists in Sourcecodester Online Event Booking and Reservation System in PHP/ MySQL via the msg parameter to / event- management/ index. php. An attacker can leverage this vulnerability in order to change the visibility of the website. Once the target user clicks on a given link he will display the content of the HTML code of the attacker' s choice
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] An HTML inject ion vulnerability exists in Sourcecodester Online Event Booking and Reservation System in PHP / MySQL via the msg param et ##er to / event - man ##a gem en ##t / index . php . An attacker can leverage this vulnerability in order to change the visibility of the web ##s ite . Once the tar get user clicks on a given link he will display the content of the HTML code of the attacker ' s choice . [SEP]
LRP (+Pred, pos-only)
[CLS] An HTML inject ion vulnerability exists in Sourcecodester Online Event Booking and Reservation System in PHP / MySQL via the msg param et ##er to / event - man ##a gem en ##t / index . php . An attacker can leverage this vulnerability in order to change the visibility of the web ##s ite . Once the tar get user clicks on a given link he will display the content of the HTML code of the attacker ' s choice . [SEP]
LIME (words)
An HTML injection vulnerability exists in Sourcecodester Online Event Booking and Reservation System in PHP/MySQL via the msg parameter to /event-management/index.php. An attacker can leverage this vulnerability in order to change the visibility of the website. Once the target user clicks on a given link he will display the content of the HTML code of the attacker's choice.
SHAP (words)
An HTML injection vulnerability exists in Sourcecodester Online Event Booking and Reservation System in PHP/ MySQL via the msg parameter to / event- management/ index. php. An attacker can leverage this vulnerability in order to change the visibility of the website. Once the target user clicks on a given link he will display the content of the HTML code of the attacker' s choice
#24 · cve_id CVE-2023-2928 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁A ▁vulnerability ▁was ▁found ▁in DedeCMS ▁up ▁to ▁5 . 7 . 10 6 . ▁It ▁has ▁been ▁declared ▁as ▁critical . Affected ▁by ▁this ▁vulnerability ▁is ▁an ▁unknown ▁functionality ▁of ▁the ▁file uploads / de de / article _ allow url ▁_ edit . php . ▁The ▁manipulation ▁of ▁the ▁argument ▁all urls ▁leads ▁to ▁code inject ion . ▁The ▁attack ▁can ▁be ▁launched ▁remotely . ▁The ▁exploit ▁has ▁been disclose d ▁to ▁the ▁public ▁and ▁may ▁be ▁used . ▁The ▁associated identifier ▁of ▁this ▁vulnerability ▁is ▁V DB - 2 300 83 . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
A vulnerability was found in DedeCMS up to 5.7.106. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file uploads/dede/article_allowurl_edit.php. The manipulation of the argument allurls leads to code injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-230083.
SHAP (words)
A vulnerability was found in DedeCMS up to 5. 7. 106. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file uploads/ dede/ article_allowurl_edit. php. The manipulation of the argument allurls leads to code injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB- 230083
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] A vulnerability was found in DedeCMS up to 5 . 7 . 106 . It has been declared as critical . Affected by this vulnerability is an unknown functionality of the file uploads / de ##de / article _ allow url _ edit . php . The man ip ul ##ation of the argument all urls leads to code inject ion . The attack can be launched remotely . The exploit has been disclose d to the public and may be used . The associated identifier of this vulnerability is V ##D ##B - 230 ##0 ##8 ##3 . [SEP]
LRP (+Pred, pos-only)
[CLS] A vulnerability was found in DedeCMS up to 5 . 7 . 106 . It has been declared as critical . Affected by this vulnerability is an unknown functionality of the file uploads / de ##de / article _ allow url _ edit . php . The man ip ul ##ation of the argument all urls leads to code inject ion . The attack can be launched remotely . The exploit has been disclose d to the public and may be used . The associated identifier of this vulnerability is V ##D ##B - 230 ##0 ##8 ##3 . [SEP]
LIME (words)
A vulnerability was found in DedeCMS up to 5.7.106. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file uploads/dede/article_allowurl_edit.php. The manipulation of the argument allurls leads to code injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-230083.
SHAP (words)
A vulnerability was found in DedeCMS up to 5. 7. 106. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file uploads/ dede/ article_allowurl_edit. php. The manipulation of the argument allurls leads to code injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB- 230083
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] A vulnerability was found in DedeCMS up to 5 . 7 . 106 . It has been declared as critical . Affected by this vulnerability is an unknown functionality of the file uploads / de ##de / article _ allow url _ edit . php . The man ip ul ##ation of the argument all urls leads to code inject ion . The attack can be launched remotely . The exploit has been disclose d to the public and may be used . The associated identifier of this vulnerability is V ##D ##B - 230 ##0 ##8 ##3 . [SEP]
LRP (+Pred, pos-only)
[CLS] A vulnerability was found in DedeCMS up to 5 . 7 . 106 . It has been declared as critical . Affected by this vulnerability is an unknown functionality of the file uploads / de ##de / article _ allow url _ edit . php . The man ip ul ##ation of the argument all urls leads to code inject ion . The attack can be launched remotely . The exploit has been disclose d to the public and may be used . The associated identifier of this vulnerability is V ##D ##B - 230 ##0 ##8 ##3 . [SEP]
LIME (words)
A vulnerability was found in DedeCMS up to 5.7.106. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file uploads/dede/article_allowurl_edit.php. The manipulation of the argument allurls leads to code injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-230083.
SHAP (words)
A vulnerability was found in DedeCMS up to 5. 7. 106. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file uploads/ dede/ article_allowurl_edit. php. The manipulation of the argument allurls leads to code injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB- 230083
#25 · cve_id CVE-2021-27888 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
Zend ▁To ▁before ▁6 . 06 - 4 ▁Beta ▁allows XSS ▁during ▁the ▁display ▁of ▁a ▁drop - off ▁in ▁which ▁a filename ▁has ▁unexpected ▁characters . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
ZendTo before 6.06-4 Beta allows XSS during the display of a drop-off in which a filename has unexpected characters.
SHAP (words)
ZendTo before 6. 06- 4 Beta allows XSS during the display of a drop- off in which a filename has unexpected characters
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Zend To before 6 . 06 - 4 Beta allows XSS d uri ng the display of a drop - off in which a filename has unexpected char act ##ers . [SEP]
LRP (+Pred, pos-only)
[CLS] Zend To before 6 . 06 - 4 Beta allows XSS d uri ng the display of a drop - off in which a filename has unexpected char act ##ers . [SEP]
LIME (words)
ZendTo before 6.06-4 Beta allows XSS during the display of a drop-off in which a filename has unexpected characters.
SHAP (words)
ZendTo before 6. 06- 4 Beta allows XSS during the display of a drop- off in which a filename has unexpected characters
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Zend To before 6 . 06 - 4 Beta allows XSS d uri ng the display of a drop - off in which a filename has unexpected char act ##ers . [SEP]
LRP (+Pred, pos-only)
[CLS] Zend To before 6 . 06 - 4 Beta allows XSS d uri ng the display of a drop - off in which a filename has unexpected char act ##ers . [SEP]
LIME (words)
ZendTo before 6.06-4 Beta allows XSS during the display of a drop-off in which a filename has unexpected characters.
SHAP (words)
ZendTo before 6. 06- 4 Beta allows XSS during the display of a drop- off in which a filename has unexpected characters
#26 · cve_id CVE-2023-49168 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
Improper Neutralization ▁of Input ▁During ▁Web ▁Page ▁Generation ( ' Cross-site Scripting ' ) ▁vulnerability ▁in ▁Word Plus ▁Better Messages ▁Live Chat ▁for WordPress ▁Buddy Press ▁Pe ep So ▁Ultimate ▁Member ▁Buddy Bo s s ▁allows Stored XSS . This ▁issue ▁affects ▁Better Messages ▁Live Chat ▁for WordPress ▁Buddy Press ▁Pe ep So ▁Ultimate ▁Member ▁Buddy Bo s s : ▁from n / a ▁through ▁2 . 4 . 0 . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WordPlus Better Messages Live Chat for WordPress BuddyPress PeepSo Ultimate Member BuddyBoss allows Stored XSS.This issue affects Better Messages Live Chat for WordPress BuddyPress PeepSo Ultimate Member BuddyBoss: from n/a through 2.4.0.
SHAP (words)
Improper Neutralization of Input During Web Page Generation (' Cross- site Scripting') vulnerability in WordPlus Better Messages – Live Chat for WordPress BuddyPress PeepSo Ultimate Member BuddyBoss allows Stored XSS. This issue affects Better Messages – Live Chat for WordPress BuddyPress PeepSo Ultimate Member BuddyBoss: from n/ a through 2. 4. 0
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Improper Neutralization of Input D uri ng Web Page Generation ( ' Cross-site Scripting ' ) vulnerability in Word ##P ##lus Better Messages Live Chat for WordPress Buddy ##P ##ress P ##eep ##S ##o Ultimate Member Buddy ##B ##oss allows Stored XSS . This issue affects Better Messages Live Chat for WordPress Buddy ##P ##ress P ##eep ##S ##o Ultimate Member Buddy ##B ##oss : from n / a through 2 . 4 . 0 . [SEP]
LRP (+Pred, pos-only)
[CLS] Improper Neutralization of Input D uri ng Web Page Generation ( ' Cross-site Scripting ' ) vulnerability in Word ##P ##lus Better Messages Live Chat for WordPress Buddy ##P ##ress P ##eep ##S ##o Ultimate Member Buddy ##B ##oss allows Stored XSS . This issue affects Better Messages Live Chat for WordPress Buddy ##P ##ress P ##eep ##S ##o Ultimate Member Buddy ##B ##oss : from n / a through 2 . 4 . 0 . [SEP]
LIME (words)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WordPlus Better Messages Live Chat for WordPress BuddyPress PeepSo Ultimate Member BuddyBoss allows Stored XSS.This issue affects Better Messages Live Chat for WordPress BuddyPress PeepSo Ultimate Member BuddyBoss: from n/a through 2.4.0.
SHAP (words)
Improper Neutralization of Input During Web Page Generation (' Cross- site Scripting') vulnerability in WordPlus Better Messages – Live Chat for WordPress BuddyPress PeepSo Ultimate Member BuddyBoss allows Stored XSS. This issue affects Better Messages – Live Chat for WordPress BuddyPress PeepSo Ultimate Member BuddyBoss: from n/ a through 2. 4. 0
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Improper Neutralization of Input D uri ng Web Page Generation ( ' Cross-site Scripting ' ) vulnerability in Word ##P ##lus Better Messages Live Chat for WordPress Buddy ##P ##ress P ##eep ##S ##o Ultimate Member Buddy ##B ##oss allows Stored XSS . This issue affects Better Messages Live Chat for WordPress Buddy ##P ##ress P ##eep ##S ##o Ultimate Member Buddy ##B ##oss : from n / a through 2 . 4 . 0 . [SEP]
LRP (+Pred, pos-only)
[CLS] Improper Neutralization of Input D uri ng Web Page Generation ( ' Cross-site Scripting ' ) vulnerability in Word ##P ##lus Better Messages Live Chat for WordPress Buddy ##P ##ress P ##eep ##S ##o Ultimate Member Buddy ##B ##oss allows Stored XSS . This issue affects Better Messages Live Chat for WordPress Buddy ##P ##ress P ##eep ##S ##o Ultimate Member Buddy ##B ##oss : from n / a through 2 . 4 . 0 . [SEP]
LIME (words)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WordPlus Better Messages Live Chat for WordPress BuddyPress PeepSo Ultimate Member BuddyBoss allows Stored XSS.This issue affects Better Messages Live Chat for WordPress BuddyPress PeepSo Ultimate Member BuddyBoss: from n/a through 2.4.0.
SHAP (words)
Improper Neutralization of Input During Web Page Generation (' Cross- site Scripting') vulnerability in WordPlus Better Messages – Live Chat for WordPress BuddyPress PeepSo Ultimate Member BuddyBoss allows Stored XSS. This issue affects Better Messages – Live Chat for WordPress BuddyPress PeepSo Ultimate Member BuddyBoss: from n/ a through 2. 4. 0
#27 · cve_id CVE-2014-10398 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁Multiple cross-site scripting ( XSS ) vulnerabilities ▁in bs i . dll ▁in ▁Bank ▁Soft ▁Systems ( BSS ) ▁R BS BS - Client . ▁Private Client ( aka ▁R BS BS - Client . Retail Client ) ▁2 . 5 ▁2 . 4 ▁and ▁earlier ▁allow ▁remote ▁attackers ▁to inject ▁arbitrary ▁web sc ▁rip t ▁or HTML ▁via ▁the ( 1 ) ▁D IC TION ARY ( 2 ) FI LTE ▁R ID ENT ( 3 ) FROM S CHE ME ( 4 ) ▁From Point ▁or ( 5 ) ▁F Name _ 0 param eter ▁and ▁a ▁valid sid param eter ▁value . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
Multiple cross-site scripting (XSS) vulnerabilities in bsi.dll in Bank Soft Systems (BSS) RBS BS-Client. Private Client (aka RBS BS-Client. Retail Client) 2.5 2.4 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) DICTIONARY (2) FILTERIDENT (3) FROMSCHEME (4) FromPoint or (5) FName_0 parameter and a valid sid parameter value.
SHAP (words)
Multiple cross- site scripting ( XSS) vulnerabilities in bsi. dll in Bank Soft Systems ( BSS) RBS BS- Client. Private Client ( aka RBS BS- Client. Retail Client) 2. 5 2. 4 and earlier allow remote attackers to inject arbitrary web script or HTML via the ( 1) DICTIONARY ( 2) FILTERIDENT ( 3) FROMSCHEME ( 4) FromPoint or ( 5) FName_0 parameter and a valid sid parameter value
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Mu ##lt ip le cross-site scripting ( XSS ) vulnerabilities in b ##si . dll in Bank Soft Systems ( BSS ) RB ##S BS - Client . Private Client ( aka RB ##S BS - Client . Retail Client ) 2 . 5 2 . 4 and earlier allow remote attackers to inject arbitrary web sc r ip t or HTML via the ( 1 ) D ##IC ##T ION AR ##Y ( 2 ) F ##I LTE R IDE NT ( 3 ) FROM SC ##H EM E ( 4 ) From ##P ##o int or ( 5 ) F ##N ##ame _ 0 param et ##er and a valid sid param et ##er value . [SEP]
LRP (+Pred, pos-only)
[CLS] Mu ##lt ip le cross-site scripting ( XSS ) vulnerabilities in b ##si . dll in Bank Soft Systems ( BSS ) RB ##S BS - Client . Private Client ( aka RB ##S BS - Client . Retail Client ) 2 . 5 2 . 4 and earlier allow remote attackers to inject arbitrary web sc r ip t or HTML via the ( 1 ) D ##IC ##T ION AR ##Y ( 2 ) F ##I LTE R IDE NT ( 3 ) FROM SC ##H EM E ( 4 ) From ##P ##o int or ( 5 ) F ##N ##ame _ 0 param et ##er and a valid sid param et ##er value . [SEP]
LIME (words)
Multiple cross-site scripting (XSS) vulnerabilities in bsi.dll in Bank Soft Systems (BSS) RBS BS-Client. Private Client (aka RBS BS-Client. Retail Client) 2.5 2.4 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) DICTIONARY (2) FILTERIDENT (3) FROMSCHEME (4) FromPoint or (5) FName_0 parameter and a valid sid parameter value.
SHAP (words)
Multiple cross- site scripting ( XSS) vulnerabilities in bsi. dll in Bank Soft Systems ( BSS) RBS BS- Client. Private Client ( aka RBS BS- Client. Retail Client) 2. 5 2. 4 and earlier allow remote attackers to inject arbitrary web script or HTML via the ( 1) DICTIONARY ( 2) FILTERIDENT ( 3) FROMSCHEME ( 4) FromPoint or ( 5) FName_0 parameter and a valid sid parameter value
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Mu ##lt ip le cross-site scripting ( XSS ) vulnerabilities in b ##si . dll in Bank Soft Systems ( BSS ) RB ##S BS - Client . Private Client ( aka RB ##S BS - Client . Retail Client ) 2 . 5 2 . 4 and earlier allow remote attackers to inject arbitrary web sc r ip t or HTML via the ( 1 ) D ##IC ##T ION AR ##Y ( 2 ) F ##I LTE R IDE NT ( 3 ) FROM SC ##H EM E ( 4 ) From ##P ##o int or ( 5 ) F ##N ##ame _ 0 param et ##er and a valid sid param et ##er value . [SEP]
LRP (+Pred, pos-only)
[CLS] Mu ##lt ip le cross-site scripting ( XSS ) vulnerabilities in b ##si . dll in Bank Soft Systems ( BSS ) RB ##S BS - Client . Private Client ( aka RB ##S BS - Client . Retail Client ) 2 . 5 2 . 4 and earlier allow remote attackers to inject arbitrary web sc r ip t or HTML via the ( 1 ) D ##IC ##T ION AR ##Y ( 2 ) F ##I LTE R IDE NT ( 3 ) FROM SC ##H EM E ( 4 ) From ##P ##o int or ( 5 ) F ##N ##ame _ 0 param et ##er and a valid sid param et ##er value . [SEP]
LIME (words)
Multiple cross-site scripting (XSS) vulnerabilities in bsi.dll in Bank Soft Systems (BSS) RBS BS-Client. Private Client (aka RBS BS-Client. Retail Client) 2.5 2.4 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) DICTIONARY (2) FILTERIDENT (3) FROMSCHEME (4) FromPoint or (5) FName_0 parameter and a valid sid parameter value.
SHAP (words)
Multiple cross- site scripting ( XSS) vulnerabilities in bsi. dll in Bank Soft Systems ( BSS) RBS BS- Client. Private Client ( aka RBS BS- Client. Retail Client) 2. 5 2. 4 and earlier allow remote attackers to inject arbitrary web script or HTML via the ( 1) DICTIONARY ( 2) FILTERIDENT ( 3) FROMSCHEME ( 4) FromPoint or ( 5) FName_0 parameter and a valid sid parameter value
#28 · cve_id CVE-2023-28666 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁The ▁In Post ▁Gallery WordPress plugin ▁in ▁versions ▁< ▁2 . 2 . 2 ▁is ▁affected ▁by ▁a ▁reflected cross-site scripting ▁vulnerability ▁in ▁the ' im g url ' param eter ▁to ▁the ▁add _ in post _ gall ery _ sl ide _ ite m ▁action ▁which ▁can ▁only ▁be ▁triggered ▁by ▁an authenticated ▁user . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
The InPost Gallery WordPress plugin in versions < 2.2.2 is affected by a reflected cross-site scripting vulnerability in the 'imgurl' parameter to the add_inpost_gallery_slide_item action which can only be triggered by an authenticated user.
SHAP (words)
The InPost Gallery WordPress plugin in versions < 2. 2. 2 is affected by a reflected cross- site scripting vulnerability in the ' imgurl' parameter to the add_inpost_gallery_slide_item action which can only be triggered by an authenticated user
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] The In ##P ##ost Gallery WordPress plugin in versions < 2 . 2 . 2 is affected by a reflected cross-site scripting vulnerability in the ' im ##g url ' param et ##er to the add _ in ##post _ gallery _ sl id ##e _ ite m action which can only be triggered by an authenticated user . [SEP]
LRP (+Pred, pos-only)
[CLS] The In ##P ##ost Gallery WordPress plugin in versions < 2 . 2 . 2 is affected by a reflected cross-site scripting vulnerability in the ' im ##g url ' param et ##er to the add _ in ##post _ gallery _ sl id ##e _ ite m action which can only be triggered by an authenticated user . [SEP]
LIME (words)
The InPost Gallery WordPress plugin in versions < 2.2.2 is affected by a reflected cross-site scripting vulnerability in the 'imgurl' parameter to the add_inpost_gallery_slide_item action which can only be triggered by an authenticated user.
SHAP (words)
The InPost Gallery WordPress plugin in versions < 2. 2. 2 is affected by a reflected cross- site scripting vulnerability in the ' imgurl' parameter to the add_inpost_gallery_slide_item action which can only be triggered by an authenticated user
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] The In ##P ##ost Gallery WordPress plugin in versions < 2 . 2 . 2 is affected by a reflected cross-site scripting vulnerability in the ' im ##g url ' param et ##er to the add _ in ##post _ gallery _ sl id ##e _ ite m action which can only be triggered by an authenticated user . [SEP]
LRP (+Pred, pos-only)
[CLS] The In ##P ##ost Gallery WordPress plugin in versions < 2 . 2 . 2 is affected by a reflected cross-site scripting vulnerability in the ' im ##g url ' param et ##er to the add _ in ##post _ gallery _ sl id ##e _ ite m action which can only be triggered by an authenticated user . [SEP]
LIME (words)
The InPost Gallery WordPress plugin in versions < 2.2.2 is affected by a reflected cross-site scripting vulnerability in the 'imgurl' parameter to the add_inpost_gallery_slide_item action which can only be triggered by an authenticated user.
SHAP (words)
The InPost Gallery WordPress plugin in versions < 2. 2. 2 is affected by a reflected cross- site scripting vulnerability in the ' imgurl' parameter to the add_inpost_gallery_slide_item action which can only be triggered by an authenticated user
#29 · cve_id CVE-2019-5158 · av
GT=LOCAL (2)
xlnet · Pred=LOCAL (2) · p=0.95 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁An exploitable firmware downgrade ▁vulnerability ▁exists ▁in ▁the firmware ▁update ▁package ▁functionality ▁of ▁the WAGO e ! C OCK P IT ▁auto matio n ▁software ▁v 1 . 6 . 1 . 5 . ▁A spec i ally ▁crafted firmware ▁update ▁file ▁can ▁allow ▁an ▁attacker ▁to ▁install ▁an ▁older firmware ▁version ▁while ▁the ▁user ▁thinks ▁a ▁newer firmware ▁version ▁is ▁being ▁installed . ▁An ▁attacker ▁can ▁create ▁a ▁custom firmware ▁update ▁package ▁with ▁invalid metadata ▁in ▁order ▁to ▁trigger ▁this ▁vulnerability . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
An exploitable firmware downgrade vulnerability exists in the firmware update package functionality of the WAGO e!COCKPIT automation software v1.6.1.5. A specially crafted firmware update file can allow an attacker to install an older firmware version while the user thinks a newer firmware version is being installed. An attacker can create a custom firmware update package with invalid metadata in order to trigger this vulnerability.
SHAP (words)
An exploitable firmware downgrade vulnerability exists in the firmware update package functionality of the WAGO e! COCKPIT automation software v1. 6. 1. 5. A specially crafted firmware update file can allow an attacker to install an older firmware version while the user thinks a newer firmware version is being installed. An attacker can create a custom firmware update package with invalid metadata in order to trigger this vulnerability
lrp-bert · Pred=LOCAL (2) · p=0.99 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] An exploitable firmware downgrade vulnerability exists in the firmware update package functionality of the WAGO e ! CO ##C ##K PI T auto matio n software v ##1 . 6 . 1 . 5 . A spec i ##ally crafted firmware update file can allow an attacker to install an older firmware version while the user thinks a newer firmware version is being installed . An attacker can create a custom firmware update package with invalid metadata in order to trigger this vulnerability . [SEP]
LRP (+Pred, pos-only)
[CLS] An exploitable firmware downgrade vulnerability exists in the firmware update package functionality of the WAGO e ! CO ##C ##K PI T auto matio n software v ##1 . 6 . 1 . 5 . A spec i ##ally crafted firmware update file can allow an attacker to install an older firmware version while the user thinks a newer firmware version is being installed . An attacker can create a custom firmware update package with invalid metadata in order to trigger this vulnerability . [SEP]
LIME (words)
An exploitable firmware downgrade vulnerability exists in the firmware update package functionality of the WAGO e!COCKPIT automation software v1.6.1.5. A specially crafted firmware update file can allow an attacker to install an older firmware version while the user thinks a newer firmware version is being installed. An attacker can create a custom firmware update package with invalid metadata in order to trigger this vulnerability.
SHAP (words)
An exploitable firmware downgrade vulnerability exists in the firmware update package functionality of the WAGO e! COCKPIT automation software v1. 6. 1. 5. A specially crafted firmware update file can allow an attacker to install an older firmware version while the user thinks a newer firmware version is being installed. An attacker can create a custom firmware update package with invalid metadata in order to trigger this vulnerability
lrp-distilbert · Pred=LOCAL (2) · p=0.98 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] An exploitable firmware downgrade vulnerability exists in the firmware update package functionality of the WAGO e ! CO ##C ##K PI T auto matio n software v ##1 . 6 . 1 . 5 . A spec i ##ally crafted firmware update file can allow an attacker to install an older firmware version while the user thinks a newer firmware version is being installed . An attacker can create a custom firmware update package with invalid metadata in order to trigger this vulnerability . [SEP]
LRP (+Pred, pos-only)
[CLS] An exploitable firmware downgrade vulnerability exists in the firmware update package functionality of the WAGO e ! CO ##C ##K PI T auto matio n software v ##1 . 6 . 1 . 5 . A spec i ##ally crafted firmware update file can allow an attacker to install an older firmware version while the user thinks a newer firmware version is being installed . An attacker can create a custom firmware update package with invalid metadata in order to trigger this vulnerability . [SEP]
LIME (words)
An exploitable firmware downgrade vulnerability exists in the firmware update package functionality of the WAGO e!COCKPIT automation software v1.6.1.5. A specially crafted firmware update file can allow an attacker to install an older firmware version while the user thinks a newer firmware version is being installed. An attacker can create a custom firmware update package with invalid metadata in order to trigger this vulnerability.
SHAP (words)
An exploitable firmware downgrade vulnerability exists in the firmware update package functionality of the WAGO e! COCKPIT automation software v1. 6. 1. 5. A specially crafted firmware update file can allow an attacker to install an older firmware version while the user thinks a newer firmware version is being installed. An attacker can create a custom firmware update package with invalid metadata in order to trigger this vulnerability
#30 · cve_id CVE-2018-12979 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁An ▁issue ▁was ▁di sc ▁over ed ▁on WAGO e ! D ISP ▁LA Y ▁76 2 - 3 000 ▁through ▁76 2 - 300 3 ▁devices ▁with firmware ▁before FW 02 . Weak permissions ▁allow ▁an authenticated ▁user ▁to overwrite ▁critical ▁files ▁by abusing ▁the unrestricted ▁file upload ▁in ▁the WBM . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
An issue was discovered on WAGO e!DISPLAY 762-3000 through 762-3003 devices with firmware before FW 02. Weak permissions allow an authenticated user to overwrite critical files by abusing the unrestricted file upload in the WBM.
SHAP (words)
An issue was discovered on WAGO e! DISPLAY 762- 3000 through 762- 3003 devices with firmware before FW 02. Weak permissions allow an authenticated user to overwrite critical files by abusing the unrestricted file upload in the WBM
lrp-bert · Pred=NETWORK (0) · p=0.99 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] An issue was di sc over ##ed on WAGO e ! D ISP LA ##Y 76 ##2 - 3000 through 76 ##2 - 300 ##3 dev ice ##s with firmware before FW 02 . Weak permissions allow an authenticated user to overwrite critical files by abusing the unrestricted file upload in the WBM . [SEP]
LRP (+Pred, pos-only)
[CLS] An issue was di sc over ##ed on WAGO e ! D ISP LA ##Y 76 ##2 - 3000 through 76 ##2 - 300 ##3 dev ice ##s with firmware before FW 02 . Weak permissions allow an authenticated user to overwrite critical files by abusing the unrestricted file upload in the WBM . [SEP]
LIME (words)
An issue was discovered on WAGO e!DISPLAY 762-3000 through 762-3003 devices with firmware before FW 02. Weak permissions allow an authenticated user to overwrite critical files by abusing the unrestricted file upload in the WBM.
SHAP (words)
An issue was discovered on WAGO e! DISPLAY 762- 3000 through 762- 3003 devices with firmware before FW 02. Weak permissions allow an authenticated user to overwrite critical files by abusing the unrestricted file upload in the WBM
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] An issue was di sc over ##ed on WAGO e ! D ISP LA ##Y 76 ##2 - 3000 through 76 ##2 - 300 ##3 dev ice ##s with firmware before FW 02 . Weak permissions allow an authenticated user to overwrite critical files by abusing the unrestricted file upload in the WBM . [SEP]
LRP (+Pred, pos-only)
[CLS] An issue was di sc over ##ed on WAGO e ! D ISP LA ##Y 76 ##2 - 3000 through 76 ##2 - 300 ##3 dev ice ##s with firmware before FW 02 . Weak permissions allow an authenticated user to overwrite critical files by abusing the unrestricted file upload in the WBM . [SEP]
LIME (words)
An issue was discovered on WAGO e!DISPLAY 762-3000 through 762-3003 devices with firmware before FW 02. Weak permissions allow an authenticated user to overwrite critical files by abusing the unrestricted file upload in the WBM.
SHAP (words)
An issue was discovered on WAGO e! DISPLAY 762- 3000 through 762- 3003 devices with firmware before FW 02. Weak permissions allow an authenticated user to overwrite critical files by abusing the unrestricted file upload in the WBM
#31 · cve_id CVE-2022-29929 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁In JetBrains TeamCity ▁before ▁20 22 . 04 ▁potential XSS ▁via Refer re r ▁header ▁was ▁po ssi ble <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
In JetBrains TeamCity before 2022.04 potential XSS via Referrer header was possible
SHAP (words)
In JetBrains TeamCity before 2022. 04 potential XSS via Referrer header was possible
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] In JetBrains TeamCity before 202 ##2 . 04 potential XSS via Refer re ##r header was p ##o ssi b ##le [SEP]
LRP (+Pred, pos-only)
[CLS] In JetBrains TeamCity before 202 ##2 . 04 potential XSS via Refer re ##r header was p ##o ssi b ##le [SEP]
LIME (words)
In JetBrains TeamCity before 2022.04 potential XSS via Referrer header was possible
SHAP (words)
In JetBrains TeamCity before 2022. 04 potential XSS via Referrer header was possible
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] In JetBrains TeamCity before 202 ##2 . 04 potential XSS via Refer re ##r header was p ##o ssi b ##le [SEP]
LRP (+Pred, pos-only)
[CLS] In JetBrains TeamCity before 202 ##2 . 04 potential XSS via Refer re ##r header was p ##o ssi b ##le [SEP]
LIME (words)
In JetBrains TeamCity before 2022.04 potential XSS via Referrer header was possible
SHAP (words)
In JetBrains TeamCity before 2022. 04 potential XSS via Referrer header was possible
#32 · cve_id CVE-2023-36576 · av
GT=LOCAL (2)
xlnet · Pred=LOCAL (2) · p=0.99 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁Windows Kernel ▁In for matio n Disclosure Vulnerability <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
Windows Kernel Information Disclosure Vulnerability
SHAP (words)
Windows Kernel Information Disclosure Vulnerability
lrp-bert · Pred=LOCAL (2) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Windows Kernel In ##fo ##r matio n Disclosure Vulnerability [SEP]
LRP (+Pred, pos-only)
[CLS] Windows Kernel In ##fo ##r matio n Disclosure Vulnerability [SEP]
LIME (words)
Windows Kernel Information Disclosure Vulnerability
SHAP (words)
Windows Kernel Information Disclosure Vulnerability
lrp-distilbert · Pred=LOCAL (2) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Windows Kernel In ##fo ##r matio n Disclosure Vulnerability [SEP]
LRP (+Pred, pos-only)
[CLS] Windows Kernel In ##fo ##r matio n Disclosure Vulnerability [SEP]
LIME (words)
Windows Kernel Information Disclosure Vulnerability
SHAP (words)
Windows Kernel Information Disclosure Vulnerability
#33 · cve_id CVE-2022-25999 · av
GT=LOCAL (2)
xlnet · Pred=LOCAL (2) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
Uncontrolled ▁search ▁path ▁element ▁in ▁the ▁Intel ( R ) ▁En pir ion ( R ) Digi tal ▁Power Configurator GUI ▁software ▁all ▁versions ▁may ▁allow ▁an authenticated ▁user ▁to ▁potentially ▁enable escalation ▁of ▁privilege ▁via ▁local ▁access . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
Uncontrolled search path element in the Intel(R) Enpirion(R) Digital Power Configurator GUI software all versions may allow an authenticated user to potentially enable escalation of privilege via local access.
SHAP (words)
Uncontrolled search path element in the Intel( R) Enpirion( R) Digital Power Configurator GUI software all versions may allow an authenticated user to potentially enable escalation of privilege via local access
lrp-bert · Pred=LOCAL (2) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Uncontrolled search path element in the Intel ( R ) En ##pi ##rion ( R ) Digi ta ##l Power Configurator GUI software all versions may allow an authenticated user to potentially enable escalation of privilege via local access . [SEP]
LRP (+Pred, pos-only)
[CLS] Uncontrolled search path element in the Intel ( R ) En ##pi ##rion ( R ) Digi ta ##l Power Configurator GUI software all versions may allow an authenticated user to potentially enable escalation of privilege via local access . [SEP]
LIME (words)
Uncontrolled search path element in the Intel(R) Enpirion(R) Digital Power Configurator GUI software all versions may allow an authenticated user to potentially enable escalation of privilege via local access.
SHAP (words)
Uncontrolled search path element in the Intel( R) Enpirion( R) Digital Power Configurator GUI software all versions may allow an authenticated user to potentially enable escalation of privilege via local access
lrp-distilbert · Pred=LOCAL (2) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Uncontrolled search path element in the Intel ( R ) En ##pi ##rion ( R ) Digi ta ##l Power Configurator GUI software all versions may allow an authenticated user to potentially enable escalation of privilege via local access . [SEP]
LRP (+Pred, pos-only)
[CLS] Uncontrolled search path element in the Intel ( R ) En ##pi ##rion ( R ) Digi ta ##l Power Configurator GUI software all versions may allow an authenticated user to potentially enable escalation of privilege via local access . [SEP]
LIME (words)
Uncontrolled search path element in the Intel(R) Enpirion(R) Digital Power Configurator GUI software all versions may allow an authenticated user to potentially enable escalation of privilege via local access.
SHAP (words)
Uncontrolled search path element in the Intel( R) Enpirion( R) Digital Power Configurator GUI software all versions may allow an authenticated user to potentially enable escalation of privilege via local access
#34 · cve_id CVE-2022-24923 · av
GT=LOCAL (2)
xlnet · Pred=LOCAL (2) · p=0.99 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
Improper ▁access ▁control ▁vulnerability ▁in ▁Samsung ▁Search Widget ▁prior ▁to ▁versions ▁2 . 3 . 00 . 6 ▁in ▁China ▁models ▁allows untrusted ▁applications ▁to ▁load ▁arbitrary URL ▁and ▁local ▁files ▁in ▁web view . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
Improper access control vulnerability in Samsung SearchWidget prior to versions 2.3.00.6 in China models allows untrusted applications to load arbitrary URL and local files in webview.
SHAP (words)
Improper access control vulnerability in Samsung SearchWidget prior to versions 2. 3. 00. 6 in China models allows untrusted applications to load arbitrary URL and local files in webview
lrp-bert · Pred=LOCAL (2) · p=0.99 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Improper access control vulnerability in Samsung Search Widget prior to versions 2 . 3 . 00 . 6 in China mod el ##s allows untrusted applications to load arbitrary URL and local files in web ##view . [SEP]
LRP (+Pred, pos-only)
[CLS] Improper access control vulnerability in Samsung Search Widget prior to versions 2 . 3 . 00 . 6 in China mod el ##s allows untrusted applications to load arbitrary URL and local files in web ##view . [SEP]
LIME (words)
Improper access control vulnerability in Samsung SearchWidget prior to versions 2.3.00.6 in China models allows untrusted applications to load arbitrary URL and local files in webview.
SHAP (words)
Improper access control vulnerability in Samsung SearchWidget prior to versions 2. 3. 00. 6 in China models allows untrusted applications to load arbitrary URL and local files in webview
lrp-distilbert · Pred=LOCAL (2) · p=0.99 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Improper access control vulnerability in Samsung Search Widget prior to versions 2 . 3 . 00 . 6 in China mod el ##s allows untrusted applications to load arbitrary URL and local files in web ##view . [SEP]
LRP (+Pred, pos-only)
[CLS] Improper access control vulnerability in Samsung Search Widget prior to versions 2 . 3 . 00 . 6 in China mod el ##s allows untrusted applications to load arbitrary URL and local files in web ##view . [SEP]
LIME (words)
Improper access control vulnerability in Samsung SearchWidget prior to versions 2.3.00.6 in China models allows untrusted applications to load arbitrary URL and local files in webview.
SHAP (words)
Improper access control vulnerability in Samsung SearchWidget prior to versions 2. 3. 00. 6 in China models allows untrusted applications to load arbitrary URL and local files in webview
#35 · cve_id CVE-2018-20523 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=0.70 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
Xiaomi ▁Stock Browser ▁10 . 2 . 4 . g ▁on Xiaomi Redmi ▁Note ▁5 ▁Pro ▁devices ▁and ▁other Redmi ▁Android ▁phones ▁allows ▁content ▁provider inject ion . ▁In ▁other ▁words ▁a third-party ▁application ▁can ▁read ▁the ▁user ' s cleartext browse r ▁history ▁via ▁an ▁app . provide r . query ▁content :// com . android . browse r . search history / search history ▁request . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
Xiaomi Stock Browser 10.2.4.g on Xiaomi Redmi Note 5 Pro devices and other Redmi Android phones allows content provider injection. In other words a third-party application can read the user's cleartext browser history via an app.provider.query content://com.android.browser.searchhistory/searchhistory request.
SHAP (words)
Xiaomi Stock Browser 10. 2. 4. g on Xiaomi Redmi Note 5 Pro devices and other Redmi Android phones allows content provider injection. In other words a third- party application can read the user' s cleartext browser history via an app. provider. query content:// com. android. browser. searchhistory/ searchhistory request
lrp-bert · Pred=LOCAL (2) · p=0.75 MIS
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Xiaomi Stock Browser 10 . 2 . 4 . g on Xiaomi Redmi Note 5 Pro dev ice ##s and other Redmi Android phones allows content provider inject ion . In other words a third-party application can read the user ' s cleartext browse r history via an app . provider . query content : / / com . android . browse r . search ##his ##tory / search ##his ##tory request . [SEP]
LRP (+Pred, pos-only)
[CLS] Xiaomi Stock Browser 10 . 2 . 4 . g on Xiaomi Redmi Note 5 Pro dev ice ##s and other Redmi Android phones allows content provider inject ion . In other words a third-party application can read the user ' s cleartext browse r history via an app . provider . query content : / / com . android . browse r . search ##his ##tory / search ##his ##tory request . [SEP]
LIME (words)
Xiaomi Stock Browser 10.2.4.g on Xiaomi Redmi Note 5 Pro devices and other Redmi Android phones allows content provider injection. In other words a third-party application can read the user's cleartext browser history via an app.provider.query content://com.android.browser.searchhistory/searchhistory request.
SHAP (words)
Xiaomi Stock Browser 10. 2. 4. g on Xiaomi Redmi Note 5 Pro devices and other Redmi Android phones allows content provider injection. In other words a third- party application can read the user' s cleartext browser history via an app. provider. query content:// com. android. browser. searchhistory/ searchhistory request
lrp-distilbert · Pred=NETWORK (0) · p=0.99 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Xiaomi Stock Browser 10 . 2 . 4 . g on Xiaomi Redmi Note 5 Pro dev ice ##s and other Redmi Android phones allows content provider inject ion . In other words a third-party application can read the user ' s cleartext browse r history via an app . provider . query content : / / com . android . browse r . search ##his ##tory / search ##his ##tory request . [SEP]
LRP (+Pred, pos-only)
[CLS] Xiaomi Stock Browser 10 . 2 . 4 . g on Xiaomi Redmi Note 5 Pro dev ice ##s and other Redmi Android phones allows content provider inject ion . In other words a third-party application can read the user ' s cleartext browse r history via an app . provider . query content : / / com . android . browse r . search ##his ##tory / search ##his ##tory request . [SEP]
LIME (words)
Xiaomi Stock Browser 10.2.4.g on Xiaomi Redmi Note 5 Pro devices and other Redmi Android phones allows content provider injection. In other words a third-party application can read the user's cleartext browser history via an app.provider.query content://com.android.browser.searchhistory/searchhistory request.
SHAP (words)
Xiaomi Stock Browser 10. 2. 4. g on Xiaomi Redmi Note 5 Pro devices and other Redmi Android phones allows content provider injection. In other words a third- party application can read the user' s cleartext browser history via an app. provider. query content:// com. android. browser. searchhistory/ searchhistory request
#36 · cve_id CVE-2023-41908 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁Cere b rate ▁before ▁1 . 15 ▁lacks ▁the Secure ▁attribute ▁for ▁the se ssi ▁on ▁cookie . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
Cerebrate before 1.15 lacks the Secure attribute for the session cookie.
SHAP (words)
Cerebrate before 1. 15 lacks the Secure attribute for the session cookie
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Ce ##re ##bra ##te before 1 . 15 lacks the Secure attribute for the se ssi on cookie . [SEP]
LRP (+Pred, pos-only)
[CLS] Ce ##re ##bra ##te before 1 . 15 lacks the Secure attribute for the se ssi on cookie . [SEP]
LIME (words)
Cerebrate before 1.15 lacks the Secure attribute for the session cookie.
SHAP (words)
Cerebrate before 1. 15 lacks the Secure attribute for the session cookie
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Ce ##re ##bra ##te before 1 . 15 lacks the Secure attribute for the se ssi on cookie . [SEP]
LRP (+Pred, pos-only)
[CLS] Ce ##re ##bra ##te before 1 . 15 lacks the Secure attribute for the se ssi on cookie . [SEP]
LIME (words)
Cerebrate before 1.15 lacks the Secure attribute for the session cookie.
SHAP (words)
Cerebrate before 1. 15 lacks the Secure attribute for the session cookie
#37 · cve_id CVE-2021-28573 · av
GT=NETWORK (0)
xlnet · Pred=LOCAL (2) · p=1.00 MIS
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁Adobe Animate ▁version ▁21 . 0 . 5 ( and ▁earlier ) ▁is ▁affected ▁by ▁an Out-of-bounds ▁Read ▁vulnerability ▁when parsing ▁a spec i ally ▁crafted ▁file . ▁An unauthenticated ▁attacker ▁could ▁leverage ▁this ▁vulnerability ▁to disclose ▁sensitive ▁in for matio n ▁in ▁the ▁context ▁of ▁the ▁current ▁user . Exploitation ▁of ▁this ▁issue ▁requires ▁user ▁interaction ▁in ▁that ▁a ▁victim ▁must ▁open ▁a malicious ▁file . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
Adobe Animate version 21.0.5 (and earlier) is affected by an Out-of-bounds Read vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to disclose sensitive information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
SHAP (words)
Adobe Animate version 21. 0. 5 ( and earlier) is affected by an Out- of- bounds Read vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to disclose sensitive information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file
lrp-bert · Pred=LOCAL (2) · p=1.00 MIS
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Adobe Animate version 21 . 0 . 5 ( and earlier ) is affected by an Out-of-bounds Read vulnerability when parsing a spec i ##ally crafted file . An unauthenticated attacker could leverage this vulnerability to disclose sensitive info ##r matio n in the context of the current user . Exploitation of this issue requires user int era ##ction in that a victim must open a malicious file . [SEP]
LRP (+Pred, pos-only)
[CLS] Adobe Animate version 21 . 0 . 5 ( and earlier ) is affected by an Out-of-bounds Read vulnerability when parsing a spec i ##ally crafted file . An unauthenticated attacker could leverage this vulnerability to disclose sensitive info ##r matio n in the context of the current user . Exploitation of this issue requires user int era ##ction in that a victim must open a malicious file . [SEP]
LIME (words)
Adobe Animate version 21.0.5 (and earlier) is affected by an Out-of-bounds Read vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to disclose sensitive information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
SHAP (words)
Adobe Animate version 21. 0. 5 ( and earlier) is affected by an Out- of- bounds Read vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to disclose sensitive information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file
lrp-distilbert · Pred=LOCAL (2) · p=1.00 MIS
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Adobe Animate version 21 . 0 . 5 ( and earlier ) is affected by an Out-of-bounds Read vulnerability when parsing a spec i ##ally crafted file . An unauthenticated attacker could leverage this vulnerability to disclose sensitive info ##r matio n in the context of the current user . Exploitation of this issue requires user int era ##ction in that a victim must open a malicious file . [SEP]
LRP (+Pred, pos-only)
[CLS] Adobe Animate version 21 . 0 . 5 ( and earlier ) is affected by an Out-of-bounds Read vulnerability when parsing a spec i ##ally crafted file . An unauthenticated attacker could leverage this vulnerability to disclose sensitive info ##r matio n in the context of the current user . Exploitation of this issue requires user int era ##ction in that a victim must open a malicious file . [SEP]
LIME (words)
Adobe Animate version 21.0.5 (and earlier) is affected by an Out-of-bounds Read vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to disclose sensitive information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
SHAP (words)
Adobe Animate version 21. 0. 5 ( and earlier) is affected by an Out- of- bounds Read vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to disclose sensitive information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file
#38 · cve_id CVE-2020-15710 · av
GT=LOCAL (2)
xlnet · Pred=LOCAL (2) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
Potential ▁double ▁free ▁in ▁Blue z ▁5 ▁module ▁of Pulse Au dio ▁could ▁allow ▁a ▁local ▁attacker ▁to ▁leak ▁memory ▁or ▁crash ▁the ▁program . ▁The ▁mo dar gs ▁variable ▁may ▁be ▁freed ▁twice ▁in ▁the ▁fail ▁condition ▁in src / mod ule s / bluetooth / mod ule - blue z 5 - de vice . c ▁and src / mod ule s / bluetooth / mod ule - blue z 5 - de vice . c . Fixed ▁in ▁1: 8 . 0 - 0 ub un tu 3 . 14 . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
Potential double free in Bluez 5 module of PulseAudio could allow a local attacker to leak memory or crash the program. The modargs variable may be freed twice in the fail condition in src/modules/bluetooth/module-bluez5-device.c and src/modules/bluetooth/module-bluez5-device.c. Fixed in 1:8.0-0ubuntu3.14.
SHAP (words)
Potential double free in Bluez 5 module of PulseAudio could allow a local attacker to leak memory or crash the program. The modargs variable may be freed twice in the fail condition in src/ modules/ bluetooth/ module- bluez5- device. c and src/ modules/ bluetooth/ module- bluez5- device. c. Fixed in 1: 8. 0- 0ubuntu3. 14
lrp-bert · Pred=LOCAL (2) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Potential double free in Blue ##z 5 mod ul ##e of Pulse Audio could allow a local attacker to leak memory or crash the program . The mod a ##rg ##s variable may be freed twice in the fail condition in src / mod ul ##es / bluetooth / mod ul ##e - blue ##z ##5 - dev ice . c and src / mod ul ##es / bluetooth / mod ul ##e - blue ##z ##5 - dev ice . c . Fixed in 1 : 8 . 0 - 0 ##ub ##unt ##u ##3 . 14 . [SEP]
LRP (+Pred, pos-only)
[CLS] Potential double free in Blue ##z 5 mod ul ##e of Pulse Audio could allow a local attacker to leak memory or crash the program . The mod a ##rg ##s variable may be freed twice in the fail condition in src / mod ul ##es / bluetooth / mod ul ##e - blue ##z ##5 - dev ice . c and src / mod ul ##es / bluetooth / mod ul ##e - blue ##z ##5 - dev ice . c . Fixed in 1 : 8 . 0 - 0 ##ub ##unt ##u ##3 . 14 . [SEP]
LIME (words)
Potential double free in Bluez 5 module of PulseAudio could allow a local attacker to leak memory or crash the program. The modargs variable may be freed twice in the fail condition in src/modules/bluetooth/module-bluez5-device.c and src/modules/bluetooth/module-bluez5-device.c. Fixed in 1:8.0-0ubuntu3.14.
SHAP (words)
Potential double free in Bluez 5 module of PulseAudio could allow a local attacker to leak memory or crash the program. The modargs variable may be freed twice in the fail condition in src/ modules/ bluetooth/ module- bluez5- device. c and src/ modules/ bluetooth/ module- bluez5- device. c. Fixed in 1: 8. 0- 0ubuntu3. 14
lrp-distilbert · Pred=LOCAL (2) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Potential double free in Blue ##z 5 mod ul ##e of Pulse Audio could allow a local attacker to leak memory or crash the program . The mod a ##rg ##s variable may be freed twice in the fail condition in src / mod ul ##es / bluetooth / mod ul ##e - blue ##z ##5 - dev ice . c and src / mod ul ##es / bluetooth / mod ul ##e - blue ##z ##5 - dev ice . c . Fixed in 1 : 8 . 0 - 0 ##ub ##unt ##u ##3 . 14 . [SEP]
LRP (+Pred, pos-only)
[CLS] Potential double free in Blue ##z 5 mod ul ##e of Pulse Audio could allow a local attacker to leak memory or crash the program . The mod a ##rg ##s variable may be freed twice in the fail condition in src / mod ul ##es / bluetooth / mod ul ##e - blue ##z ##5 - dev ice . c and src / mod ul ##es / bluetooth / mod ul ##e - blue ##z ##5 - dev ice . c . Fixed in 1 : 8 . 0 - 0 ##ub ##unt ##u ##3 . 14 . [SEP]
LIME (words)
Potential double free in Bluez 5 module of PulseAudio could allow a local attacker to leak memory or crash the program. The modargs variable may be freed twice in the fail condition in src/modules/bluetooth/module-bluez5-device.c and src/modules/bluetooth/module-bluez5-device.c. Fixed in 1:8.0-0ubuntu3.14.
SHAP (words)
Potential double free in Bluez 5 module of PulseAudio could allow a local attacker to leak memory or crash the program. The modargs variable may be freed twice in the fail condition in src/ modules/ bluetooth/ module- bluez5- device. c and src/ modules/ bluetooth/ module- bluez5- device. c. Fixed in 1: 8. 0- 0ubuntu3. 14
#39 · cve_id CVE-2023-51094 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
Tenda ▁M 3 ▁V 1 . 0 . 0 . 12 ( 48 56 ) ▁was ▁di sc ▁over ed ▁to ▁contain ▁a ▁Command Execution ▁vulnerability ▁via ▁the ▁function Tenda Telnet . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
Tenda M3 V1.0.0.12(4856) was discovered to contain a Command Execution vulnerability via the function TendaTelnet.
SHAP (words)
Tenda M3 V1. 0. 0. 12( 4856) was discovered to contain a Command Execution vulnerability via the function TendaTelnet
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Tenda M ##3 V ##1 . 0 . 0 . 12 ( 48 ##5 ##6 ) was di sc over ##ed to contain a Command Execution vulnerability via the function Tenda Telnet . [SEP]
LRP (+Pred, pos-only)
[CLS] Tenda M ##3 V ##1 . 0 . 0 . 12 ( 48 ##5 ##6 ) was di sc over ##ed to contain a Command Execution vulnerability via the function Tenda Telnet . [SEP]
LIME (words)
Tenda M3 V1.0.0.12(4856) was discovered to contain a Command Execution vulnerability via the function TendaTelnet.
SHAP (words)
Tenda M3 V1. 0. 0. 12( 4856) was discovered to contain a Command Execution vulnerability via the function TendaTelnet
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Tenda M ##3 V ##1 . 0 . 0 . 12 ( 48 ##5 ##6 ) was di sc over ##ed to contain a Command Execution vulnerability via the function Tenda Telnet . [SEP]
LRP (+Pred, pos-only)
[CLS] Tenda M ##3 V ##1 . 0 . 0 . 12 ( 48 ##5 ##6 ) was di sc over ##ed to contain a Command Execution vulnerability via the function Tenda Telnet . [SEP]
LIME (words)
Tenda M3 V1.0.0.12(4856) was discovered to contain a Command Execution vulnerability via the function TendaTelnet.
SHAP (words)
Tenda M3 V1. 0. 0. 12( 4856) was discovered to contain a Command Execution vulnerability via the function TendaTelnet
#40 · cve_id CVE-2020-11072 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁In SLP Validate ( npm ▁package sl ▁p - validate ) ▁before ▁version ▁1 . 2 . 1 ▁users ▁could ▁experience ▁false - negative validation ▁outcomes ▁for ▁M INT ▁transaction ▁operations . ▁A ▁poorly ▁implemented SLP ▁wallet ▁could ▁allow ▁spending ▁of ▁the ▁affected tokens ▁which ▁would ▁result ▁in ▁the ▁destruction ▁of ▁a ▁user ' s ▁mint ing baton . ▁This ▁has ▁been ▁fixed ▁in sl ▁p - validate ▁in ▁version ▁1 . 2 . 1 . ▁Add i ton ally sl ▁p js ▁version ▁0 . 27 . 2 ▁has ▁a ▁related ▁fix ▁under ▁related CVE - 20 20 - 110 71 . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
In SLP Validate (npm package slp-validate) before version 1.2.1 users could experience false-negative validation outcomes for MINT transaction operations. A poorly implemented SLP wallet could allow spending of the affected tokens which would result in the destruction of a user's minting baton. This has been fixed in slp-validate in version 1.2.1. Additonally slpjs version 0.27.2 has a related fix under related CVE-2020-11071.
SHAP (words)
In SLP Validate ( npm package slp- validate) before version 1. 2. 1 users could experience false- negative validation outcomes for MINT transaction operations. A poorly implemented SLP wallet could allow spending of the affected tokens which would result in the destruction of a user' s minting baton. This has been fixed in slp- validate in version 1. 2. 1. Additonally slpjs version 0. 27. 2 has a related fix under related CVE- 2020- 11071
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] In SLP Validate ( npm package sl p - validate ) before version 1 . 2 . 1 users could experience false - negative validation outcomes for MI NT transaction operations . A poorly implemented SLP wallet could allow spending of the affected tokens which would result in the de struct ion of a user ' s m int ing bat ##on . This has been fixed in sl p - validate in version 1 . 2 . 1 . Add it ##onal ##ly sl p js version 0 . 27 . 2 has a related fix under related CVE - 2020 - 110 ##7 ##1 . [SEP]
LRP (+Pred, pos-only)
[CLS] In SLP Validate ( npm package sl p - validate ) before version 1 . 2 . 1 users could experience false - negative validation outcomes for MI NT transaction operations . A poorly implemented SLP wallet could allow spending of the affected tokens which would result in the de struct ion of a user ' s m int ing bat ##on . This has been fixed in sl p - validate in version 1 . 2 . 1 . Add it ##onal ##ly sl p js version 0 . 27 . 2 has a related fix under related CVE - 2020 - 110 ##7 ##1 . [SEP]
LIME (words)
In SLP Validate (npm package slp-validate) before version 1.2.1 users could experience false-negative validation outcomes for MINT transaction operations. A poorly implemented SLP wallet could allow spending of the affected tokens which would result in the destruction of a user's minting baton. This has been fixed in slp-validate in version 1.2.1. Additonally slpjs version 0.27.2 has a related fix under related CVE-2020-11071.
SHAP (words)
In SLP Validate ( npm package slp- validate) before version 1. 2. 1 users could experience false- negative validation outcomes for MINT transaction operations. A poorly implemented SLP wallet could allow spending of the affected tokens which would result in the destruction of a user' s minting baton. This has been fixed in slp- validate in version 1. 2. 1. Additonally slpjs version 0. 27. 2 has a related fix under related CVE- 2020- 11071
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] In SLP Validate ( npm package sl p - validate ) before version 1 . 2 . 1 users could experience false - negative validation outcomes for MI NT transaction operations . A poorly implemented SLP wallet could allow spending of the affected tokens which would result in the de struct ion of a user ' s m int ing bat ##on . This has been fixed in sl p - validate in version 1 . 2 . 1 . Add it ##onal ##ly sl p js version 0 . 27 . 2 has a related fix under related CVE - 2020 - 110 ##7 ##1 . [SEP]
LRP (+Pred, pos-only)
[CLS] In SLP Validate ( npm package sl p - validate ) before version 1 . 2 . 1 users could experience false - negative validation outcomes for MI NT transaction operations . A poorly implemented SLP wallet could allow spending of the affected tokens which would result in the de struct ion of a user ' s m int ing bat ##on . This has been fixed in sl p - validate in version 1 . 2 . 1 . Add it ##onal ##ly sl p js version 0 . 27 . 2 has a related fix under related CVE - 2020 - 110 ##7 ##1 . [SEP]
LIME (words)
In SLP Validate (npm package slp-validate) before version 1.2.1 users could experience false-negative validation outcomes for MINT transaction operations. A poorly implemented SLP wallet could allow spending of the affected tokens which would result in the destruction of a user's minting baton. This has been fixed in slp-validate in version 1.2.1. Additonally slpjs version 0.27.2 has a related fix under related CVE-2020-11071.
SHAP (words)
In SLP Validate ( npm package slp- validate) before version 1. 2. 1 users could experience false- negative validation outcomes for MINT transaction operations. A poorly implemented SLP wallet could allow spending of the affected tokens which would result in the destruction of a user' s minting baton. This has been fixed in slp- validate in version 1. 2. 1. Additonally slpjs version 0. 27. 2 has a related fix under related CVE- 2020- 11071
#41 · cve_id CVE-2021-2008 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
Vulnerability ▁in ▁the ▁Enterprise Manage r ▁for ▁Fusion Middleware ▁product ▁of ▁Oracle ▁Enterprise Manage r ( com ponent : ▁FM W ▁Control Plugin ) . ▁The ▁supported ▁version ▁that ▁is ▁affected ▁are ▁11 . 1 . 1 . 9 ▁and ▁12 . 2 . 1 . 3 Easily exploitable ▁vulnerability ▁allows unauthenticated ▁attacker ▁with ▁network ▁access ▁via HTTP ▁to ▁compromise ▁Enterprise Manage r ▁for ▁Fusion Middleware . Successful ▁attacks ▁of ▁this ▁vulnerability ▁can ▁result ▁in unauthorized ▁update ▁insert ▁or delete ▁access ▁to ▁some ▁of ▁Enterprise Manage r ▁for ▁Fusion Middleware acce ssi ble ▁data ▁as ▁well ▁as unauthorized ▁read ▁access ▁to ▁a ▁subset ▁of ▁Enterprise Manage r ▁for ▁Fusion Middleware acce ssi ble ▁data ▁and unauthorized ▁ability ▁to ▁cause ▁a ▁partial ▁denial ▁of ▁service ( part ial ▁DO S ) ▁of ▁Enterprise Manage r ▁for ▁Fusion Middleware . CVSS ▁3 . 1 ▁Base ▁Score ▁7 . 3 ( Con fid ential ity Integrity ▁and Availability ▁impacts ) . CVSS Vector : ( CVSS : 3 . 1/ AV : N / AC : L / PR : N / UI : N / S : U / C : L / I : L / A : L ) . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
Vulnerability in the Enterprise Manager for Fusion Middleware product of Oracle Enterprise Manager (component: FMW Control Plugin). The supported version that is affected are 11.1.1.9 and 12.2.1.3 Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Enterprise Manager for Fusion Middleware. Successful attacks of this vulnerability can result in unauthorized update insert or delete access to some of Enterprise Manager for Fusion Middleware accessible data as well as unauthorized read access to a subset of Enterprise Manager for Fusion Middleware accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Enterprise Manager for Fusion Middleware. CVSS 3.1 Base Score 7.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).
SHAP (words)
Vulnerability in the Enterprise Manager for Fusion Middleware product of Oracle Enterprise Manager ( component: FMW Control Plugin). The supported version that is affected are 11. 1. 1. 9 and 12. 2. 1. 3 Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Enterprise Manager for Fusion Middleware. Successful attacks of this vulnerability can result in unauthorized update insert or delete access to some of Enterprise Manager for Fusion Middleware accessible data as well as unauthorized read access to a subset of Enterprise Manager for Fusion Middleware accessible data and unauthorized ability to cause a partial denial of service ( partial DOS) of Enterprise Manager for Fusion Middleware. CVSS 3. 1 Base Score 7. 3 ( Confidentiality Integrity and Availability impacts). CVSS Vector: ( CVSS: 3. 1/ AV: N/ AC: L/ PR: N/ UI: N/ S: U/ C: L/ I: L/ A: L
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Vulnerability in the Enterprise Manage r for Fusion Middleware product of Oracle Enterprise Manage r ( component : FM ##W Control Plugin ) . The supported version that is affected are 11 . 1 . 1 . 9 and 12 . 2 . 1 . 3 Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Enterprise Manage r for Fusion Middleware . Successful attacks of this vulnerability can result in unauthorized update insert or delete access to some of Enterprise Manage r for Fusion Middleware a ##cc ##e ssi b ##le data as well as unauthorized read access to a subset of Enterprise Manage r for Fusion Middleware a ##cc ##e ssi b ##le data and unauthorized ability to cause a partial denial of service ( partial DOS ) of Enterprise Manage r for Fusion Middleware . CVSS 3 . 1 Base Score 7 . 3 ( Con fid en ##tial ##ity Integrity and Availability impacts ) . CVSS Vector : ( CVSS : 3 . 1 / AV : N / AC : L / PR : N / UI : N / S : U / C : L / I : L / A : L ) . [SEP]
LRP (+Pred, pos-only)
[CLS] Vulnerability in the Enterprise Manage r for Fusion Middleware product of Oracle Enterprise Manage r ( component : FM ##W Control Plugin ) . The supported version that is affected are 11 . 1 . 1 . 9 and 12 . 2 . 1 . 3 Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Enterprise Manage r for Fusion Middleware . Successful attacks of this vulnerability can result in unauthorized update insert or delete access to some of Enterprise Manage r for Fusion Middleware a ##cc ##e ssi b ##le data as well as unauthorized read access to a subset of Enterprise Manage r for Fusion Middleware a ##cc ##e ssi b ##le data and unauthorized ability to cause a partial denial of service ( partial DOS ) of Enterprise Manage r for Fusion Middleware . CVSS 3 . 1 Base Score 7 . 3 ( Con fid en ##tial ##ity Integrity and Availability impacts ) . CVSS Vector : ( CVSS : 3 . 1 / AV : N / AC : L / PR : N / UI : N / S : U / C : L / I : L / A : L ) . [SEP]
LIME (words)
Vulnerability in the Enterprise Manager for Fusion Middleware product of Oracle Enterprise Manager (component: FMW Control Plugin). The supported version that is affected are 11.1.1.9 and 12.2.1.3 Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Enterprise Manager for Fusion Middleware. Successful attacks of this vulnerability can result in unauthorized update insert or delete access to some of Enterprise Manager for Fusion Middleware accessible data as well as unauthorized read access to a subset of Enterprise Manager for Fusion Middleware accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Enterprise Manager for Fusion Middleware. CVSS 3.1 Base Score 7.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).
SHAP (words)
Vulnerability in the Enterprise Manager for Fusion Middleware product of Oracle Enterprise Manager ( component: FMW Control Plugin). The supported version that is affected are 11. 1. 1. 9 and 12. 2. 1. 3 Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Enterprise Manager for Fusion Middleware. Successful attacks of this vulnerability can result in unauthorized update insert or delete access to some of Enterprise Manager for Fusion Middleware accessible data as well as unauthorized read access to a subset of Enterprise Manager for Fusion Middleware accessible data and unauthorized ability to cause a partial denial of service ( partial DOS) of Enterprise Manager for Fusion Middleware. CVSS 3. 1 Base Score 7. 3 ( Confidentiality Integrity and Availability impacts). CVSS Vector: ( CVSS: 3. 1/ AV: N/ AC: L/ PR: N/ UI: N/ S: U/ C: L/ I: L/ A: L
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Vulnerability in the Enterprise Manage r for Fusion Middleware product of Oracle Enterprise Manage r ( component : FM ##W Control Plugin ) . The supported version that is affected are 11 . 1 . 1 . 9 and 12 . 2 . 1 . 3 Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Enterprise Manage r for Fusion Middleware . Successful attacks of this vulnerability can result in unauthorized update insert or delete access to some of Enterprise Manage r for Fusion Middleware a ##cc ##e ssi b ##le data as well as unauthorized read access to a subset of Enterprise Manage r for Fusion Middleware a ##cc ##e ssi b ##le data and unauthorized ability to cause a partial denial of service ( partial DOS ) of Enterprise Manage r for Fusion Middleware . CVSS 3 . 1 Base Score 7 . 3 ( Con fid en ##tial ##ity Integrity and Availability impacts ) . CVSS Vector : ( CVSS : 3 . 1 / AV : N / AC : L / PR : N / UI : N / S : U / C : L / I : L / A : L ) . [SEP]
LRP (+Pred, pos-only)
[CLS] Vulnerability in the Enterprise Manage r for Fusion Middleware product of Oracle Enterprise Manage r ( component : FM ##W Control Plugin ) . The supported version that is affected are 11 . 1 . 1 . 9 and 12 . 2 . 1 . 3 Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Enterprise Manage r for Fusion Middleware . Successful attacks of this vulnerability can result in unauthorized update insert or delete access to some of Enterprise Manage r for Fusion Middleware a ##cc ##e ssi b ##le data as well as unauthorized read access to a subset of Enterprise Manage r for Fusion Middleware a ##cc ##e ssi b ##le data and unauthorized ability to cause a partial denial of service ( partial DOS ) of Enterprise Manage r for Fusion Middleware . CVSS 3 . 1 Base Score 7 . 3 ( Con fid en ##tial ##ity Integrity and Availability impacts ) . CVSS Vector : ( CVSS : 3 . 1 / AV : N / AC : L / PR : N / UI : N / S : U / C : L / I : L / A : L ) . [SEP]
LIME (words)
Vulnerability in the Enterprise Manager for Fusion Middleware product of Oracle Enterprise Manager (component: FMW Control Plugin). The supported version that is affected are 11.1.1.9 and 12.2.1.3 Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Enterprise Manager for Fusion Middleware. Successful attacks of this vulnerability can result in unauthorized update insert or delete access to some of Enterprise Manager for Fusion Middleware accessible data as well as unauthorized read access to a subset of Enterprise Manager for Fusion Middleware accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Enterprise Manager for Fusion Middleware. CVSS 3.1 Base Score 7.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).
SHAP (words)
Vulnerability in the Enterprise Manager for Fusion Middleware product of Oracle Enterprise Manager ( component: FMW Control Plugin). The supported version that is affected are 11. 1. 1. 9 and 12. 2. 1. 3 Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Enterprise Manager for Fusion Middleware. Successful attacks of this vulnerability can result in unauthorized update insert or delete access to some of Enterprise Manager for Fusion Middleware accessible data as well as unauthorized read access to a subset of Enterprise Manager for Fusion Middleware accessible data and unauthorized ability to cause a partial denial of service ( partial DOS) of Enterprise Manager for Fusion Middleware. CVSS 3. 1 Base Score 7. 3 ( Confidentiality Integrity and Availability impacts). CVSS Vector: ( CVSS: 3. 1/ AV: N/ AC: L/ PR: N/ UI: N/ S: U/ C: L/ I: L/ A: L
#42 · cve_id CVE-2019-2502 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
Vulnerability ▁in ▁the MySQL ▁Server ▁component ▁of ▁Oracle MySQL ( sub com ponent : ▁In no DB ) . Supported ▁versions ▁that ▁are ▁affected ▁are ▁8 . 0 . 13 ▁and ▁prior . Easily exploitable ▁vulnerability ▁allows ▁high ▁privileged ▁attacker ▁with ▁network ▁access ▁via ▁multiple ▁protocols ▁to ▁compromise MySQL ▁Server . Successful ▁attacks ▁of ▁this ▁vulnerability ▁can ▁result ▁in unauthorized ▁ability ▁to ▁cause ▁a ▁hang ▁or ▁frequently repeatable ▁crash ( complete ▁DO S ) ▁of MySQL ▁Server . CVSS ▁3 . 0 ▁Base ▁Score ▁4 . 9 ( Availability ▁impacts ) . CVSS Vector : ( CVSS : 3 . 0 / AV : N / AC : L / PR : H / UI : N / S : U / C : N / I : N / A : H ) . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 8.0.13 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
SHAP (words)
Vulnerability in the MySQL Server component of Oracle MySQL ( subcomponent: InnoDB). Supported versions that are affected are 8. 0. 13 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash ( complete DOS) of MySQL Server. CVSS 3. 0 Base Score 4. 9 ( Availability impacts). CVSS Vector: ( CVSS: 3. 0/ AV: N/ AC: L/ PR: H/ UI: N/ S: U/ C: N/ I: N/ A: H
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Vulnerability in the MySQL Server component of Oracle MySQL ( sub ##com ##po ##nent : Inn ##o ##D ##B ) . Supported versions that are affected are 8 . 0 . 13 and prior . Easily exploitable vulnerability allows high privileged attacker with network access via m ##ult ip le protocols to compromise MySQL Server . Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash ( complete DOS ) of MySQL Server . CVSS 3 . 0 Base Score 4 . 9 ( Availability impacts ) . CVSS Vector : ( CVSS : 3 . 0 / AV : N / AC : L / PR : H / UI : N / S : U / C : N / I : N / A : H ) . [SEP]
LRP (+Pred, pos-only)
[CLS] Vulnerability in the MySQL Server component of Oracle MySQL ( sub ##com ##po ##nent : Inn ##o ##D ##B ) . Supported versions that are affected are 8 . 0 . 13 and prior . Easily exploitable vulnerability allows high privileged attacker with network access via m ##ult ip le protocols to compromise MySQL Server . Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash ( complete DOS ) of MySQL Server . CVSS 3 . 0 Base Score 4 . 9 ( Availability impacts ) . CVSS Vector : ( CVSS : 3 . 0 / AV : N / AC : L / PR : H / UI : N / S : U / C : N / I : N / A : H ) . [SEP]
LIME (words)
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 8.0.13 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
SHAP (words)
Vulnerability in the MySQL Server component of Oracle MySQL ( subcomponent: InnoDB). Supported versions that are affected are 8. 0. 13 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash ( complete DOS) of MySQL Server. CVSS 3. 0 Base Score 4. 9 ( Availability impacts). CVSS Vector: ( CVSS: 3. 0/ AV: N/ AC: L/ PR: H/ UI: N/ S: U/ C: N/ I: N/ A: H
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Vulnerability in the MySQL Server component of Oracle MySQL ( sub ##com ##po ##nent : Inn ##o ##D ##B ) . Supported versions that are affected are 8 . 0 . 13 and prior . Easily exploitable vulnerability allows high privileged attacker with network access via m ##ult ip le protocols to compromise MySQL Server . Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash ( complete DOS ) of MySQL Server . CVSS 3 . 0 Base Score 4 . 9 ( Availability impacts ) . CVSS Vector : ( CVSS : 3 . 0 / AV : N / AC : L / PR : H / UI : N / S : U / C : N / I : N / A : H ) . [SEP]
LRP (+Pred, pos-only)
[CLS] Vulnerability in the MySQL Server component of Oracle MySQL ( sub ##com ##po ##nent : Inn ##o ##D ##B ) . Supported versions that are affected are 8 . 0 . 13 and prior . Easily exploitable vulnerability allows high privileged attacker with network access via m ##ult ip le protocols to compromise MySQL Server . Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash ( complete DOS ) of MySQL Server . CVSS 3 . 0 Base Score 4 . 9 ( Availability impacts ) . CVSS Vector : ( CVSS : 3 . 0 / AV : N / AC : L / PR : H / UI : N / S : U / C : N / I : N / A : H ) . [SEP]
LIME (words)
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 8.0.13 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
SHAP (words)
Vulnerability in the MySQL Server component of Oracle MySQL ( subcomponent: InnoDB). Supported versions that are affected are 8. 0. 13 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash ( complete DOS) of MySQL Server. CVSS 3. 0 Base Score 4. 9 ( Availability impacts). CVSS Vector: ( CVSS: 3. 0/ AV: N/ AC: L/ PR: H/ UI: N/ S: U/ C: N/ I: N/ A: H
#43 · cve_id CVE-2011-2523 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁vs ftp d ▁2 . 3 . 4 ▁downloaded ▁between ▁2011 06 30 ▁and ▁2011 07 03 ▁contains ▁a backdoor ▁which ▁opens ▁a ▁shell ▁on ▁port ▁6 200 / t c p . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
vsftpd 2.3.4 downloaded between 20110630 and 20110703 contains a backdoor which opens a shell on port 6200/tcp.
SHAP (words)
vsftpd 2. 3. 4 downloaded between 20110630 and 20110703 contains a backdoor which opens a shell on port 6200/ tcp
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] vs ftp d 2 . 3 . 4 downloaded between 2011 ##0 ##6 ##30 and 2011 ##0 ##70 ##3 contains a backdoor which opens a shell on port 620 ##0 / t ##c ##p . [SEP]
LRP (+Pred, pos-only)
[CLS] vs ftp d 2 . 3 . 4 downloaded between 2011 ##0 ##6 ##30 and 2011 ##0 ##70 ##3 contains a backdoor which opens a shell on port 620 ##0 / t ##c ##p . [SEP]
LIME (words)
vsftpd 2.3.4 downloaded between 20110630 and 20110703 contains a backdoor which opens a shell on port 6200/tcp.
SHAP (words)
vsftpd 2. 3. 4 downloaded between 20110630 and 20110703 contains a backdoor which opens a shell on port 6200/ tcp
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] vs ftp d 2 . 3 . 4 downloaded between 2011 ##0 ##6 ##30 and 2011 ##0 ##70 ##3 contains a backdoor which opens a shell on port 620 ##0 / t ##c ##p . [SEP]
LRP (+Pred, pos-only)
[CLS] vs ftp d 2 . 3 . 4 downloaded between 2011 ##0 ##6 ##30 and 2011 ##0 ##70 ##3 contains a backdoor which opens a shell on port 620 ##0 / t ##c ##p . [SEP]
LIME (words)
vsftpd 2.3.4 downloaded between 20110630 and 20110703 contains a backdoor which opens a shell on port 6200/tcp.
SHAP (words)
vsftpd 2. 3. 4 downloaded between 20110630 and 20110703 contains a backdoor which opens a shell on port 6200/ tcp
#44 · cve_id CVE-2021-20272 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁A flaw ▁was ▁found ▁in priv oxy ▁before ▁3 . 0 . 32 . ▁An ▁assertion ▁failure ▁could ▁be ▁triggered ▁with ▁a ▁crafted CGI ▁request ▁leading ▁to ▁server ▁crash . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
A flaw was found in privoxy before 3.0.32. An assertion failure could be triggered with a crafted CGI request leading to server crash.
SHAP (words)
A flaw was found in privoxy before 3. 0. 32. An assertion failure could be triggered with a crafted CGI request leading to server crash
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] A flaw was found in p ##ri ##vo ##xy before 3 . 0 . 32 . An assertion failure could be triggered with a crafted CGI request leading to server crash . [SEP]
LRP (+Pred, pos-only)
[CLS] A flaw was found in p ##ri ##vo ##xy before 3 . 0 . 32 . An assertion failure could be triggered with a crafted CGI request leading to server crash . [SEP]
LIME (words)
A flaw was found in privoxy before 3.0.32. An assertion failure could be triggered with a crafted CGI request leading to server crash.
SHAP (words)
A flaw was found in privoxy before 3. 0. 32. An assertion failure could be triggered with a crafted CGI request leading to server crash
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] A flaw was found in p ##ri ##vo ##xy before 3 . 0 . 32 . An assertion failure could be triggered with a crafted CGI request leading to server crash . [SEP]
LRP (+Pred, pos-only)
[CLS] A flaw was found in p ##ri ##vo ##xy before 3 . 0 . 32 . An assertion failure could be triggered with a crafted CGI request leading to server crash . [SEP]
LIME (words)
A flaw was found in privoxy before 3.0.32. An assertion failure could be triggered with a crafted CGI request leading to server crash.
SHAP (words)
A flaw was found in privoxy before 3. 0. 32. An assertion failure could be triggered with a crafted CGI request leading to server crash
#45 · cve_id CVE-2020-35816 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁Certain NETGEAR ▁devices ▁are ▁affected ▁by ▁stored XSS . ▁This ▁affects ▁D 7 800 ▁before ▁1 . 0 . 1 . 56 ▁R 7 500 v 2 ▁before ▁1 . 0 . 3 . 46 ▁R 7 800 ▁before ▁1 . 0 . 2 . 74 ▁R 8 900 ▁before ▁1 . 0 . 4 . 28 ▁R 9 000 ▁before ▁1 . 0 . 4 . 28 ▁R AX 120 ▁before ▁1 . 0 . 0 . 78 RB K 20 ▁before ▁2 . 3 . 5 . 26 ▁R BR 20 ▁before ▁2 . 3 . 5 . 26 ▁R BS 20 ▁before ▁2 . 3 . 5 . 26 RB K 40 ▁before ▁2 . 3 . 5 . 30 ▁R BR 40 ▁before ▁2 . 3 . 5 . 30 ▁R BS 40 ▁before ▁2 . 3 . 5 . 30 RB K 50 ▁before ▁2 . 3 . 5 . 30 ▁R BR 50 ▁before ▁2 . 3 . 5 . 30 ▁R BS 50 ▁before ▁2 . 3 . 5 . 30 XR ▁500 ▁before ▁2 . 3 . 2 . 56 ▁and XR ▁700 ▁before ▁1 . 0 . 1 . 10 . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
Certain NETGEAR devices are affected by stored XSS. This affects D7800 before 1.0.1.56 R7500v2 before 1.0.3.46 R7800 before 1.0.2.74 R8900 before 1.0.4.28 R9000 before 1.0.4.28 RAX120 before 1.0.0.78 RBK20 before 2.3.5.26 RBR20 before 2.3.5.26 RBS20 before 2.3.5.26 RBK40 before 2.3.5.30 RBR40 before 2.3.5.30 RBS40 before 2.3.5.30 RBK50 before 2.3.5.30 RBR50 before 2.3.5.30 RBS50 before 2.3.5.30 XR500 before 2.3.2.56 and XR700 before 1.0.1.10.
SHAP (words)
Certain NETGEAR devices are affected by stored XSS. This affects D7800 before 1. 0. 1. 56 R7500v2 before 1. 0. 3. 46 R7800 before 1. 0. 2. 74 R8900 before 1. 0. 4. 28 R9000 before 1. 0. 4. 28 RAX120 before 1. 0. 0. 78 RBK20 before 2. 3. 5. 26 RBR20 before 2. 3. 5. 26 RBS20 before 2. 3. 5. 26 RBK40 before 2. 3. 5. 30 RBR40 before 2. 3. 5. 30 RBS40 before 2. 3. 5. 30 RBK50 before 2. 3. 5. 30 RBR50 before 2. 3. 5. 30 RBS50 before 2. 3. 5. 30 XR500 before 2. 3. 2. 56 and XR700 before 1. 0. 1. 10
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Certain NETGEAR dev ice ##s are affected by stored XSS . This affects D ##7 ##80 ##0 before 1 . 0 . 1 . 56 R ##75 ##00 ##v ##2 before 1 . 0 . 3 . 46 R ##7 ##80 ##0 before 1 . 0 . 2 . 74 R ##8 ##90 ##0 before 1 . 0 . 4 . 28 R ##90 ##00 before 1 . 0 . 4 . 28 R AX 120 before 1 . 0 . 0 . 78 RB ##K ##20 before 2 . 3 . 5 . 26 RB ##R ##20 before 2 . 3 . 5 . 26 RB ##S ##20 before 2 . 3 . 5 . 26 RB ##K ##40 before 2 . 3 . 5 . 30 RB ##R ##40 before 2 . 3 . 5 . 30 RB ##S ##40 before 2 . 3 . 5 . 30 RB ##K ##50 before 2 . 3 . 5 . 30 RB ##R ##50 before 2 . 3 . 5 . 30 RB ##S ##50 before 2 . 3 . 5 . 30 XR 500 before 2 . 3 . 2 . 56 and XR 700 before 1 . 0 . 1 . 10 . [SEP]
LRP (+Pred, pos-only)
[CLS] Certain NETGEAR dev ice ##s are affected by stored XSS . This affects D ##7 ##80 ##0 before 1 . 0 . 1 . 56 R ##75 ##00 ##v ##2 before 1 . 0 . 3 . 46 R ##7 ##80 ##0 before 1 . 0 . 2 . 74 R ##8 ##90 ##0 before 1 . 0 . 4 . 28 R ##90 ##00 before 1 . 0 . 4 . 28 R AX 120 before 1 . 0 . 0 . 78 RB ##K ##20 before 2 . 3 . 5 . 26 RB ##R ##20 before 2 . 3 . 5 . 26 RB ##S ##20 before 2 . 3 . 5 . 26 RB ##K ##40 before 2 . 3 . 5 . 30 RB ##R ##40 before 2 . 3 . 5 . 30 RB ##S ##40 before 2 . 3 . 5 . 30 RB ##K ##50 before 2 . 3 . 5 . 30 RB ##R ##50 before 2 . 3 . 5 . 30 RB ##S ##50 before 2 . 3 . 5 . 30 XR 500 before 2 . 3 . 2 . 56 and XR 700 before 1 . 0 . 1 . 10 . [SEP]
LIME (words)
Certain NETGEAR devices are affected by stored XSS. This affects D7800 before 1.0.1.56 R7500v2 before 1.0.3.46 R7800 before 1.0.2.74 R8900 before 1.0.4.28 R9000 before 1.0.4.28 RAX120 before 1.0.0.78 RBK20 before 2.3.5.26 RBR20 before 2.3.5.26 RBS20 before 2.3.5.26 RBK40 before 2.3.5.30 RBR40 before 2.3.5.30 RBS40 before 2.3.5.30 RBK50 before 2.3.5.30 RBR50 before 2.3.5.30 RBS50 before 2.3.5.30 XR500 before 2.3.2.56 and XR700 before 1.0.1.10.
SHAP (words)
Certain NETGEAR devices are affected by stored XSS. This affects D7800 before 1. 0. 1. 56 R7500v2 before 1. 0. 3. 46 R7800 before 1. 0. 2. 74 R8900 before 1. 0. 4. 28 R9000 before 1. 0. 4. 28 RAX120 before 1. 0. 0. 78 RBK20 before 2. 3. 5. 26 RBR20 before 2. 3. 5. 26 RBS20 before 2. 3. 5. 26 RBK40 before 2. 3. 5. 30 RBR40 before 2. 3. 5. 30 RBS40 before 2. 3. 5. 30 RBK50 before 2. 3. 5. 30 RBR50 before 2. 3. 5. 30 RBS50 before 2. 3. 5. 30 XR500 before 2. 3. 2. 56 and XR700 before 1. 0. 1. 10
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Certain NETGEAR dev ice ##s are affected by stored XSS . This affects D ##7 ##80 ##0 before 1 . 0 . 1 . 56 R ##75 ##00 ##v ##2 before 1 . 0 . 3 . 46 R ##7 ##80 ##0 before 1 . 0 . 2 . 74 R ##8 ##90 ##0 before 1 . 0 . 4 . 28 R ##90 ##00 before 1 . 0 . 4 . 28 R AX 120 before 1 . 0 . 0 . 78 RB ##K ##20 before 2 . 3 . 5 . 26 RB ##R ##20 before 2 . 3 . 5 . 26 RB ##S ##20 before 2 . 3 . 5 . 26 RB ##K ##40 before 2 . 3 . 5 . 30 RB ##R ##40 before 2 . 3 . 5 . 30 RB ##S ##40 before 2 . 3 . 5 . 30 RB ##K ##50 before 2 . 3 . 5 . 30 RB ##R ##50 before 2 . 3 . 5 . 30 RB ##S ##50 before 2 . 3 . 5 . 30 XR 500 before 2 . 3 . 2 . 56 and XR 700 before 1 . 0 . 1 . 10 . [SEP]
LRP (+Pred, pos-only)
[CLS] Certain NETGEAR dev ice ##s are affected by stored XSS . This affects D ##7 ##80 ##0 before 1 . 0 . 1 . 56 R ##75 ##00 ##v ##2 before 1 . 0 . 3 . 46 R ##7 ##80 ##0 before 1 . 0 . 2 . 74 R ##8 ##90 ##0 before 1 . 0 . 4 . 28 R ##90 ##00 before 1 . 0 . 4 . 28 R AX 120 before 1 . 0 . 0 . 78 RB ##K ##20 before 2 . 3 . 5 . 26 RB ##R ##20 before 2 . 3 . 5 . 26 RB ##S ##20 before 2 . 3 . 5 . 26 RB ##K ##40 before 2 . 3 . 5 . 30 RB ##R ##40 before 2 . 3 . 5 . 30 RB ##S ##40 before 2 . 3 . 5 . 30 RB ##K ##50 before 2 . 3 . 5 . 30 RB ##R ##50 before 2 . 3 . 5 . 30 RB ##S ##50 before 2 . 3 . 5 . 30 XR 500 before 2 . 3 . 2 . 56 and XR 700 before 1 . 0 . 1 . 10 . [SEP]
LIME (words)
Certain NETGEAR devices are affected by stored XSS. This affects D7800 before 1.0.1.56 R7500v2 before 1.0.3.46 R7800 before 1.0.2.74 R8900 before 1.0.4.28 R9000 before 1.0.4.28 RAX120 before 1.0.0.78 RBK20 before 2.3.5.26 RBR20 before 2.3.5.26 RBS20 before 2.3.5.26 RBK40 before 2.3.5.30 RBR40 before 2.3.5.30 RBS40 before 2.3.5.30 RBK50 before 2.3.5.30 RBR50 before 2.3.5.30 RBS50 before 2.3.5.30 XR500 before 2.3.2.56 and XR700 before 1.0.1.10.
SHAP (words)
Certain NETGEAR devices are affected by stored XSS. This affects D7800 before 1. 0. 1. 56 R7500v2 before 1. 0. 3. 46 R7800 before 1. 0. 2. 74 R8900 before 1. 0. 4. 28 R9000 before 1. 0. 4. 28 RAX120 before 1. 0. 0. 78 RBK20 before 2. 3. 5. 26 RBR20 before 2. 3. 5. 26 RBS20 before 2. 3. 5. 26 RBK40 before 2. 3. 5. 30 RBR40 before 2. 3. 5. 30 RBS40 before 2. 3. 5. 30 RBK50 before 2. 3. 5. 30 RBR50 before 2. 3. 5. 30 RBS50 before 2. 3. 5. 30 XR500 before 2. 3. 2. 56 and XR700 before 1. 0. 1. 10
#46 · cve_id CVE-2022-25230 · av
GT=LOCAL (2)
xlnet · Pred=LOCAL (2) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁Use ▁after ▁free ▁vulnerability ▁in CX - Programmer ▁v 9 . 76 . 1 ▁and ▁earlier ▁which ▁is ▁a ▁part ▁of CX-One ( v 4 . 60 ) ▁suite ▁allows ▁an ▁attacker ▁to ▁cause ▁in for matio n ▁di sc los ure ▁and / or ▁arbitrary ▁code ▁execution ▁by ▁having ▁a ▁user ▁to ▁open ▁a spec i ally ▁crafted CX ▁P ▁file . ▁This ▁vulnerability ▁is diff er ent ▁from CVE - 20 22 - 25 3 25 . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
Use after free vulnerability in CX-Programmer v9.76.1 and earlier which is a part of CX-One (v4.60) suite allows an attacker to cause information disclosure and/or arbitrary code execution by having a user to open a specially crafted CXP file. This vulnerability is different from CVE-2022-25325.
SHAP (words)
Use after free vulnerability in CX- Programmer v9. 76. 1 and earlier which is a part of CX- One ( v4. 60) suite allows an attacker to cause information disclosure and/ or arbitrary code execution by having a user to open a specially crafted CXP file. This vulnerability is different from CVE- 2022- 25325
lrp-bert · Pred=LOCAL (2) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Use after free vulnerability in CX - Programmer v ##9 . 76 . 1 and earlier which is a part of CX-One ( v ##4 . 60 ) su ite allows an attacker to cause info ##r matio n di sc los ##ure and / or arbitrary code exec u ##tion by having a user to open a spec i ##ally crafted CX P file . This vulnerability is diff er ##ent from CVE - 202 ##2 - 253 ##25 . [SEP]
LRP (+Pred, pos-only)
[CLS] Use after free vulnerability in CX - Programmer v ##9 . 76 . 1 and earlier which is a part of CX-One ( v ##4 . 60 ) su ite allows an attacker to cause info ##r matio n di sc los ##ure and / or arbitrary code exec u ##tion by having a user to open a spec i ##ally crafted CX P file . This vulnerability is diff er ##ent from CVE - 202 ##2 - 253 ##25 . [SEP]
LIME (words)
Use after free vulnerability in CX-Programmer v9.76.1 and earlier which is a part of CX-One (v4.60) suite allows an attacker to cause information disclosure and/or arbitrary code execution by having a user to open a specially crafted CXP file. This vulnerability is different from CVE-2022-25325.
SHAP (words)
Use after free vulnerability in CX- Programmer v9. 76. 1 and earlier which is a part of CX- One ( v4. 60) suite allows an attacker to cause information disclosure and/ or arbitrary code execution by having a user to open a specially crafted CXP file. This vulnerability is different from CVE- 2022- 25325
lrp-distilbert · Pred=LOCAL (2) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Use after free vulnerability in CX - Programmer v ##9 . 76 . 1 and earlier which is a part of CX-One ( v ##4 . 60 ) su ite allows an attacker to cause info ##r matio n di sc los ##ure and / or arbitrary code exec u ##tion by having a user to open a spec i ##ally crafted CX P file . This vulnerability is diff er ##ent from CVE - 202 ##2 - 253 ##25 . [SEP]
LRP (+Pred, pos-only)
[CLS] Use after free vulnerability in CX - Programmer v ##9 . 76 . 1 and earlier which is a part of CX-One ( v ##4 . 60 ) su ite allows an attacker to cause info ##r matio n di sc los ##ure and / or arbitrary code exec u ##tion by having a user to open a spec i ##ally crafted CX P file . This vulnerability is diff er ##ent from CVE - 202 ##2 - 253 ##25 . [SEP]
LIME (words)
Use after free vulnerability in CX-Programmer v9.76.1 and earlier which is a part of CX-One (v4.60) suite allows an attacker to cause information disclosure and/or arbitrary code execution by having a user to open a specially crafted CXP file. This vulnerability is different from CVE-2022-25325.
SHAP (words)
Use after free vulnerability in CX- Programmer v9. 76. 1 and earlier which is a part of CX- One ( v4. 60) suite allows an attacker to cause information disclosure and/ or arbitrary code execution by having a user to open a specially crafted CXP file. This vulnerability is different from CVE- 2022- 25325
#47 · cve_id CVE-2023-41851 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
Cross-Site Request Forgery ( CSRF ) ▁vulnerability ▁in ▁Do t square s WP ▁Custom ▁Post Template ▁< = ▁1 . 0 ▁versions . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
Cross-Site Request Forgery (CSRF) vulnerability in Dotsquares WP Custom Post Template <= 1.0 versions.
SHAP (words)
Cross- Site Request Forgery ( CSRF) vulnerability in Dotsquares WP Custom Post Template <=  1. 0 versions
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Cross-Site Request Forgery ( CSRF ) vulnerability in Dot ##s ##qua ##res WP Custom Post Template < = 1 . 0 versions . [SEP]
LRP (+Pred, pos-only)
[CLS] Cross-Site Request Forgery ( CSRF ) vulnerability in Dot ##s ##qua ##res WP Custom Post Template < = 1 . 0 versions . [SEP]
LIME (words)
Cross-Site Request Forgery (CSRF) vulnerability in Dotsquares WP Custom Post Template <= 1.0 versions.
SHAP (words)
Cross- Site Request Forgery ( CSRF) vulnerability in Dotsquares WP Custom Post Template <=  1. 0 versions
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Cross-Site Request Forgery ( CSRF ) vulnerability in Dot ##s ##qua ##res WP Custom Post Template < = 1 . 0 versions . [SEP]
LRP (+Pred, pos-only)
[CLS] Cross-Site Request Forgery ( CSRF ) vulnerability in Dot ##s ##qua ##res WP Custom Post Template < = 1 . 0 versions . [SEP]
LIME (words)
Cross-Site Request Forgery (CSRF) vulnerability in Dotsquares WP Custom Post Template <= 1.0 versions.
SHAP (words)
Cross- Site Request Forgery ( CSRF) vulnerability in Dotsquares WP Custom Post Template <=  1. 0 versions
#48 · cve_id CVE-2021-32515 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=0.99 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁Directory ▁listing ▁vulnerability ▁in ▁share _ link ▁in ▁Q SAN Storage Manage r ▁allows ▁attackers ▁to ▁list ▁arbitrary directories ▁and ▁further ▁access credential ▁in for matio n . ▁The ref err ed ▁vulnerability ▁has ▁been ▁solved ▁with ▁the ▁updated ▁version ▁of ▁Q SAN Storage Manage r ▁v 3 . 3 . 3 . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
Directory listing vulnerability in share_link in QSAN Storage Manager allows attackers to list arbitrary directories and further access credential information. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3.
SHAP (words)
Directory listing vulnerability in share_link in QSAN Storage Manager allows attackers to list arbitrary directories and further access credential information. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3. 3. 3
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Directory listing vulnerability in share _ link in Q SAN Storage Manage r allows attackers to list arbitrary directories and further access credential info ##r matio n . The re ##f err ed vulnerability has been solved with the updated version of Q SAN Storage Manage r v ##3 . 3 . 3 . [SEP]
LRP (+Pred, pos-only)
[CLS] Directory listing vulnerability in share _ link in Q SAN Storage Manage r allows attackers to list arbitrary directories and further access credential info ##r matio n . The re ##f err ed vulnerability has been solved with the updated version of Q SAN Storage Manage r v ##3 . 3 . 3 . [SEP]
LIME (words)
Directory listing vulnerability in share_link in QSAN Storage Manager allows attackers to list arbitrary directories and further access credential information. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3.
SHAP (words)
Directory listing vulnerability in share_link in QSAN Storage Manager allows attackers to list arbitrary directories and further access credential information. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3. 3. 3
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Directory listing vulnerability in share _ link in Q SAN Storage Manage r allows attackers to list arbitrary directories and further access credential info ##r matio n . The re ##f err ed vulnerability has been solved with the updated version of Q SAN Storage Manage r v ##3 . 3 . 3 . [SEP]
LRP (+Pred, pos-only)
[CLS] Directory listing vulnerability in share _ link in Q SAN Storage Manage r allows attackers to list arbitrary directories and further access credential info ##r matio n . The re ##f err ed vulnerability has been solved with the updated version of Q SAN Storage Manage r v ##3 . 3 . 3 . [SEP]
LIME (words)
Directory listing vulnerability in share_link in QSAN Storage Manager allows attackers to list arbitrary directories and further access credential information. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3.
SHAP (words)
Directory listing vulnerability in share_link in QSAN Storage Manager allows attackers to list arbitrary directories and further access credential information. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3. 3. 3
#49 · cve_id CVE-2022-45412 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=0.97 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁When resolving ▁a symlink ▁such ▁as ▁< code > file :// / pro c / self / f d /1 </ code > ▁an err ▁or ▁message ▁may ▁be ▁produced ▁where ▁the symlink ▁was ▁resolved ▁to ▁a ▁string ▁containing ▁unit ial ized ▁memory ▁in ▁the ▁buffer . ▁< br > * This ▁bug ▁only ▁affects Thunderbird ▁on ▁Unix - based ▁operated ▁systems ( And roid ▁Linux MacOS ) . ▁Windows ▁is unaffected . * . ▁This ▁vulnerability ▁affects Firefox ESR ▁< ▁102 . 5 Thunderbird ▁< ▁102 . 5 ▁and Firefox ▁< ▁107 . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
When resolving a symlink such as <code>file:///proc/self/fd/1</code> an error message may be produced where the symlink was resolved to a string containing unitialized memory in the buffer. <br>*This bug only affects Thunderbird on Unix-based operated systems (Android Linux MacOS). Windows is unaffected.*. This vulnerability affects Firefox ESR < 102.5 Thunderbird < 102.5 and Firefox < 107.
SHAP (words)
When resolving a symlink such as < code> file:/// proc/ self/ fd/ 1</ code> an error message may be produced where the symlink was resolved to a string containing unitialized memory in the buffer. < br>* This bug only affects Thunderbird on Unix- based operated systems ( Android Linux MacOS). Windows is unaffected.*. This vulnerability affects Firefox ESR < 102. 5 Thunderbird < 102. 5 and Firefox < 107
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] When resolving a symlink such as < code > file : / / / pro ##c / s elf / f ##d / 1 < / code > an err or message may be produced where the symlink was resolved to a string containing unit ##ial ##ized memory in the buffer . < br > * This bug only affects Thunderbird on Unix - based operated systems ( Android Linux MacOS ) . Windows is unaffected . * . This vulnerability affects Firefox ESR < 102 . 5 Thunderbird < 102 . 5 and Firefox < 107 . [SEP]
LRP (+Pred, pos-only)
[CLS] When resolving a symlink such as < code > file : / / / pro ##c / s elf / f ##d / 1 < / code > an err or message may be produced where the symlink was resolved to a string containing unit ##ial ##ized memory in the buffer . < br > * This bug only affects Thunderbird on Unix - based operated systems ( Android Linux MacOS ) . Windows is unaffected . * . This vulnerability affects Firefox ESR < 102 . 5 Thunderbird < 102 . 5 and Firefox < 107 . [SEP]
LIME (words)
When resolving a symlink such as <code>file:///proc/self/fd/1</code> an error message may be produced where the symlink was resolved to a string containing unitialized memory in the buffer. <br>*This bug only affects Thunderbird on Unix-based operated systems (Android Linux MacOS). Windows is unaffected.*. This vulnerability affects Firefox ESR < 102.5 Thunderbird < 102.5 and Firefox < 107.
SHAP (words)
When resolving a symlink such as < code> file:/// proc/ self/ fd/ 1</ code> an error message may be produced where the symlink was resolved to a string containing unitialized memory in the buffer. < br>* This bug only affects Thunderbird on Unix- based operated systems ( Android Linux MacOS). Windows is unaffected.*. This vulnerability affects Firefox ESR < 102. 5 Thunderbird < 102. 5 and Firefox < 107
lrp-distilbert · Pred=NETWORK (0) · p=0.99 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] When resolving a symlink such as < code > file : / / / pro ##c / s elf / f ##d / 1 < / code > an err or message may be produced where the symlink was resolved to a string containing unit ##ial ##ized memory in the buffer . < br > * This bug only affects Thunderbird on Unix - based operated systems ( Android Linux MacOS ) . Windows is unaffected . * . This vulnerability affects Firefox ESR < 102 . 5 Thunderbird < 102 . 5 and Firefox < 107 . [SEP]
LRP (+Pred, pos-only)
[CLS] When resolving a symlink such as < code > file : / / / pro ##c / s elf / f ##d / 1 < / code > an err or message may be produced where the symlink was resolved to a string containing unit ##ial ##ized memory in the buffer . < br > * This bug only affects Thunderbird on Unix - based operated systems ( Android Linux MacOS ) . Windows is unaffected . * . This vulnerability affects Firefox ESR < 102 . 5 Thunderbird < 102 . 5 and Firefox < 107 . [SEP]
LIME (words)
When resolving a symlink such as <code>file:///proc/self/fd/1</code> an error message may be produced where the symlink was resolved to a string containing unitialized memory in the buffer. <br>*This bug only affects Thunderbird on Unix-based operated systems (Android Linux MacOS). Windows is unaffected.*. This vulnerability affects Firefox ESR < 102.5 Thunderbird < 102.5 and Firefox < 107.
SHAP (words)
When resolving a symlink such as < code> file:/// proc/ self/ fd/ 1</ code> an error message may be produced where the symlink was resolved to a string containing unitialized memory in the buffer. < br>* This bug only affects Thunderbird on Unix- based operated systems ( Android Linux MacOS). Windows is unaffected.*. This vulnerability affects Firefox ESR < 102. 5 Thunderbird < 102. 5 and Firefox < 107
#50 · cve_id CVE-2023-25908 · av
GT=LOCAL (2)
xlnet · Pred=LOCAL (2) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁Adobe Photoshop ▁versions ▁23 . 5 . 3 ( and ▁earlier ) ▁and ▁24 . 1 . 1 ( and ▁earlier ) ▁are ▁affected ▁by ▁a ▁Use ▁After ▁Free ▁vulnerability ▁that ▁could ▁result ▁in ▁arbitrary ▁code ▁execution ▁in ▁the ▁context ▁of ▁the ▁current ▁user . Exploitation ▁of ▁this ▁issue ▁requires ▁user ▁interaction ▁in ▁that ▁a ▁victim ▁must ▁open ▁a malicious ▁file . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
Adobe Photoshop versions 23.5.3 (and earlier) and 24.1.1 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
SHAP (words)
Adobe Photoshop versions 23. 5. 3 ( and earlier) and 24. 1. 1 ( and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file
lrp-bert · Pred=LOCAL (2) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Adobe Photoshop versions 23 . 5 . 3 ( and earlier ) and 24 . 1 . 1 ( and earlier ) are affected by a Use After Free vulnerability that could result in arbitrary code exec u ##tion in the context of the current user . Exploitation of this issue requires user int era ##ction in that a victim must open a malicious file . [SEP]
LRP (+Pred, pos-only)
[CLS] Adobe Photoshop versions 23 . 5 . 3 ( and earlier ) and 24 . 1 . 1 ( and earlier ) are affected by a Use After Free vulnerability that could result in arbitrary code exec u ##tion in the context of the current user . Exploitation of this issue requires user int era ##ction in that a victim must open a malicious file . [SEP]
LIME (words)
Adobe Photoshop versions 23.5.3 (and earlier) and 24.1.1 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
SHAP (words)
Adobe Photoshop versions 23. 5. 3 ( and earlier) and 24. 1. 1 ( and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file
lrp-distilbert · Pred=LOCAL (2) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Adobe Photoshop versions 23 . 5 . 3 ( and earlier ) and 24 . 1 . 1 ( and earlier ) are affected by a Use After Free vulnerability that could result in arbitrary code exec u ##tion in the context of the current user . Exploitation of this issue requires user int era ##ction in that a victim must open a malicious file . [SEP]
LRP (+Pred, pos-only)
[CLS] Adobe Photoshop versions 23 . 5 . 3 ( and earlier ) and 24 . 1 . 1 ( and earlier ) are affected by a Use After Free vulnerability that could result in arbitrary code exec u ##tion in the context of the current user . Exploitation of this issue requires user int era ##ction in that a victim must open a malicious file . [SEP]
LIME (words)
Adobe Photoshop versions 23.5.3 (and earlier) and 24.1.1 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
SHAP (words)
Adobe Photoshop versions 23. 5. 3 ( and earlier) and 24. 1. 1 ( and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file
#51 · cve_id CVE-2023-21942 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
Vulnerability ▁in ▁Oracle ▁Es s base ( com ponent : ▁Security ▁and Provisioning ) . ▁The ▁supported ▁version ▁that ▁is ▁affected ▁is ▁21 . 4 . Difficult ▁to ▁exploit ▁vulnerability ▁allows unauthenticated ▁attacker ▁with ▁network ▁access ▁via HTTP ▁to ▁compromise ▁Oracle ▁Es s base . Successful ▁attacks ▁require ▁human ▁interaction ▁from ▁a ▁person ▁other ▁than ▁the ▁attacker . Successful ▁attacks ▁of ▁this ▁vulnerability ▁can ▁result ▁in unauthorized ▁access ▁to ▁critical ▁data ▁or ▁complete ▁access ▁to ▁all ▁Oracle ▁Es s base acce ssi ble ▁data . CVSS ▁3 . 1 ▁Base ▁Score ▁5 . 3 ( Con fid ential ity ▁impacts ) . CVSS Vector : ( CVSS : 3 . 1/ AV : N / AC : H / PR : N / UI : R / S : U / C : H / I : N / A : N ) . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
Vulnerability in Oracle Essbase (component: Security and Provisioning). The supported version that is affected is 21.4. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Essbase. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Essbase accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N).
SHAP (words)
Vulnerability in Oracle Essbase ( component: Security and Provisioning). The supported version that is affected is 21. 4. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Essbase. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Essbase accessible data. CVSS 3. 1 Base Score 5. 3 ( Confidentiality impacts). CVSS Vector: ( CVSS: 3. 1/ AV: N/ AC: H/ PR: N/ UI: R/ S: U/ C: H/ I: N/ A: N
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Vulnerability in Oracle E ##ss ##base ( component : Se ##c uri t ##y and Provisioning ) . The supported version that is affected is 21 . 4 . Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle E ##ss ##base . Successful attacks require human int era ##ction from a person other than the attacker . Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle E ##ss ##base a ##cc ##e ssi b ##le data . CVSS 3 . 1 Base Score 5 . 3 ( Con fid en ##tial ##ity impacts ) . CVSS Vector : ( CVSS : 3 . 1 / AV : N / AC : H / PR : N / UI : R / S : U / C : H / I : N / A : N ) . [SEP]
LRP (+Pred, pos-only)
[CLS] Vulnerability in Oracle E ##ss ##base ( component : Se ##c uri t ##y and Provisioning ) . The supported version that is affected is 21 . 4 . Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle E ##ss ##base . Successful attacks require human int era ##ction from a person other than the attacker . Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle E ##ss ##base a ##cc ##e ssi b ##le data . CVSS 3 . 1 Base Score 5 . 3 ( Con fid en ##tial ##ity impacts ) . CVSS Vector : ( CVSS : 3 . 1 / AV : N / AC : H / PR : N / UI : R / S : U / C : H / I : N / A : N ) . [SEP]
LIME (words)
Vulnerability in Oracle Essbase (component: Security and Provisioning). The supported version that is affected is 21.4. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Essbase. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Essbase accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N).
SHAP (words)
Vulnerability in Oracle Essbase ( component: Security and Provisioning). The supported version that is affected is 21. 4. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Essbase. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Essbase accessible data. CVSS 3. 1 Base Score 5. 3 ( Confidentiality impacts). CVSS Vector: ( CVSS: 3. 1/ AV: N/ AC: H/ PR: N/ UI: R/ S: U/ C: H/ I: N/ A: N
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Vulnerability in Oracle E ##ss ##base ( component : Se ##c uri t ##y and Provisioning ) . The supported version that is affected is 21 . 4 . Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle E ##ss ##base . Successful attacks require human int era ##ction from a person other than the attacker . Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle E ##ss ##base a ##cc ##e ssi b ##le data . CVSS 3 . 1 Base Score 5 . 3 ( Con fid en ##tial ##ity impacts ) . CVSS Vector : ( CVSS : 3 . 1 / AV : N / AC : H / PR : N / UI : R / S : U / C : H / I : N / A : N ) . [SEP]
LRP (+Pred, pos-only)
[CLS] Vulnerability in Oracle E ##ss ##base ( component : Se ##c uri t ##y and Provisioning ) . The supported version that is affected is 21 . 4 . Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle E ##ss ##base . Successful attacks require human int era ##ction from a person other than the attacker . Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle E ##ss ##base a ##cc ##e ssi b ##le data . CVSS 3 . 1 Base Score 5 . 3 ( Con fid en ##tial ##ity impacts ) . CVSS Vector : ( CVSS : 3 . 1 / AV : N / AC : H / PR : N / UI : R / S : U / C : H / I : N / A : N ) . [SEP]
LIME (words)
Vulnerability in Oracle Essbase (component: Security and Provisioning). The supported version that is affected is 21.4. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Essbase. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Essbase accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N).
SHAP (words)
Vulnerability in Oracle Essbase ( component: Security and Provisioning). The supported version that is affected is 21. 4. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Essbase. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Essbase accessible data. CVSS 3. 1 Base Score 5. 3 ( Confidentiality impacts). CVSS Vector: ( CVSS: 3. 1/ AV: N/ AC: H/ PR: N/ UI: R/ S: U/ C: H/ I: N/ A: N
#52 · cve_id CVE-2020-12001 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=0.92 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
FactoryTalk Linx ▁versions ▁6 . 00 ▁6 . 10 ▁and ▁6 . 11 RSLinx ▁Cla ssi ▁c ▁v 4 . 11 . 00 ▁and ▁prior Connected Components Workbench : ▁Version ▁12 ▁and ▁prior ▁Control FL ASH : ▁Version ▁14 ▁and ▁later ▁Control FL ASH ▁Plus : ▁Version ▁1 ▁and ▁later FactoryTalk Asset ▁Centre : ▁Version ▁9 ▁and ▁later FactoryTalk Linx ▁Com m D TM : ▁Version ▁1 ▁and ▁later ▁Studio ▁5000 Launcher : ▁Version ▁31 ▁and ▁later ▁Stud ▁5000 Logix ▁Designer ▁software : ▁Version ▁32 ▁and ▁prior ▁is ▁vulnerable . ▁The parsing ▁mechanism ▁that ▁processes ▁certain ▁file ▁types ▁does ▁not ▁provide ▁input ▁sanitation . ▁This ▁may ▁allow ▁an ▁attacker ▁to ▁use spec i ally ▁crafted ▁files ▁to traverse ▁the ▁file ▁system ▁and ▁modify ▁or ▁expose ▁sensitive ▁data ▁or ▁execute ▁arbitrary ▁code . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
FactoryTalk Linx versions 6.00 6.10 and 6.11 RSLinx Classic v4.11.00 and prior Connected Components Workbench: Version 12 and prior ControlFLASH: Version 14 and later ControlFLASH Plus: Version 1 and later FactoryTalk Asset Centre: Version 9 and later FactoryTalk Linx CommDTM: Version 1 and later Studio 5000 Launcher: Version 31 and later Stud 5000 Logix Designer software: Version 32 and prior is vulnerable. The parsing mechanism that processes certain file types does not provide input sanitation. This may allow an attacker to use specially crafted files to traverse the file system and modify or expose sensitive data or execute arbitrary code.
SHAP (words)
FactoryTalk Linx versions 6. 00 6. 10 and 6. 11 RSLinx Classic v4. 11. 00 and prior Connected Components Workbench: Version 12 and prior ControlFLASH: Version 14 and later ControlFLASH Plus: Version 1 and later FactoryTalk Asset Centre: Version 9 and later FactoryTalk Linx CommDTM: Version 1 and later Studio 5000 Launcher: Version 31 and later Stud 5000 Logix Designer software: Version 32 and prior is vulnerable. The parsing mechanism that processes certain file types does not provide input sanitation. This may allow an attacker to use specially crafted files to traverse the file system and modify or expose sensitive data or execute arbitrary code
lrp-bert · Pred=LOCAL (2) · p=0.92 MIS
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] FactoryTalk Linx versions 6 . 00 6 . 10 and 6 . 11 RSLinx C ##la ssi c v ##4 . 11 . 00 and prior Connected Components Workbench : Ver si ##on 12 and prior Control ##FL ##AS ##H : Ver si ##on 14 and later Control ##FL ##AS ##H Plus : Ver si ##on 1 and later FactoryTalk Asset Centre : Ver si ##on 9 and later FactoryTalk Linx Co ##mm ##D ##TM : Ver si ##on 1 and later Studio 5000 Launcher : Ver si ##on 31 and later St ##ud 5000 Logix Designer software : Ver si ##on 32 and prior is vulnerable . The parsing mechanism that processes certain file types does not provide input sanitation . This may allow an attacker to use spec i ##ally crafted files to traverse the file system and mod if ##y or expose sensitive data or exec u ##te arbitrary code . [SEP]
LRP (+Pred, pos-only)
[CLS] FactoryTalk Linx versions 6 . 00 6 . 10 and 6 . 11 RSLinx C ##la ssi c v ##4 . 11 . 00 and prior Connected Components Workbench : Ver si ##on 12 and prior Control ##FL ##AS ##H : Ver si ##on 14 and later Control ##FL ##AS ##H Plus : Ver si ##on 1 and later FactoryTalk Asset Centre : Ver si ##on 9 and later FactoryTalk Linx Co ##mm ##D ##TM : Ver si ##on 1 and later Studio 5000 Launcher : Ver si ##on 31 and later St ##ud 5000 Logix Designer software : Ver si ##on 32 and prior is vulnerable . The parsing mechanism that processes certain file types does not provide input sanitation . This may allow an attacker to use spec i ##ally crafted files to traverse the file system and mod if ##y or expose sensitive data or exec u ##te arbitrary code . [SEP]
LIME (words)
FactoryTalk Linx versions 6.00 6.10 and 6.11 RSLinx Classic v4.11.00 and prior Connected Components Workbench: Version 12 and prior ControlFLASH: Version 14 and later ControlFLASH Plus: Version 1 and later FactoryTalk Asset Centre: Version 9 and later FactoryTalk Linx CommDTM: Version 1 and later Studio 5000 Launcher: Version 31 and later Stud 5000 Logix Designer software: Version 32 and prior is vulnerable. The parsing mechanism that processes certain file types does not provide input sanitation. This may allow an attacker to use specially crafted files to traverse the file system and modify or expose sensitive data or execute arbitrary code.
SHAP (words)
FactoryTalk Linx versions 6. 00 6. 10 and 6. 11 RSLinx Classic v4. 11. 00 and prior Connected Components Workbench: Version 12 and prior ControlFLASH: Version 14 and later ControlFLASH Plus: Version 1 and later FactoryTalk Asset Centre: Version 9 and later FactoryTalk Linx CommDTM: Version 1 and later Studio 5000 Launcher: Version 31 and later Stud 5000 Logix Designer software: Version 32 and prior is vulnerable. The parsing mechanism that processes certain file types does not provide input sanitation. This may allow an attacker to use specially crafted files to traverse the file system and modify or expose sensitive data or execute arbitrary code
lrp-distilbert · Pred=NETWORK (0) · p=0.97 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] FactoryTalk Linx versions 6 . 00 6 . 10 and 6 . 11 RSLinx C ##la ssi c v ##4 . 11 . 00 and prior Connected Components Workbench : Ver si ##on 12 and prior Control ##FL ##AS ##H : Ver si ##on 14 and later Control ##FL ##AS ##H Plus : Ver si ##on 1 and later FactoryTalk Asset Centre : Ver si ##on 9 and later FactoryTalk Linx Co ##mm ##D ##TM : Ver si ##on 1 and later Studio 5000 Launcher : Ver si ##on 31 and later St ##ud 5000 Logix Designer software : Ver si ##on 32 and prior is vulnerable . The parsing mechanism that processes certain file types does not provide input sanitation . This may allow an attacker to use spec i ##ally crafted files to traverse the file system and mod if ##y or expose sensitive data or exec u ##te arbitrary code . [SEP]
LRP (+Pred, pos-only)
[CLS] FactoryTalk Linx versions 6 . 00 6 . 10 and 6 . 11 RSLinx C ##la ssi c v ##4 . 11 . 00 and prior Connected Components Workbench : Ver si ##on 12 and prior Control ##FL ##AS ##H : Ver si ##on 14 and later Control ##FL ##AS ##H Plus : Ver si ##on 1 and later FactoryTalk Asset Centre : Ver si ##on 9 and later FactoryTalk Linx Co ##mm ##D ##TM : Ver si ##on 1 and later Studio 5000 Launcher : Ver si ##on 31 and later St ##ud 5000 Logix Designer software : Ver si ##on 32 and prior is vulnerable . The parsing mechanism that processes certain file types does not provide input sanitation . This may allow an attacker to use spec i ##ally crafted files to traverse the file system and mod if ##y or expose sensitive data or exec u ##te arbitrary code . [SEP]
LIME (words)
FactoryTalk Linx versions 6.00 6.10 and 6.11 RSLinx Classic v4.11.00 and prior Connected Components Workbench: Version 12 and prior ControlFLASH: Version 14 and later ControlFLASH Plus: Version 1 and later FactoryTalk Asset Centre: Version 9 and later FactoryTalk Linx CommDTM: Version 1 and later Studio 5000 Launcher: Version 31 and later Stud 5000 Logix Designer software: Version 32 and prior is vulnerable. The parsing mechanism that processes certain file types does not provide input sanitation. This may allow an attacker to use specially crafted files to traverse the file system and modify or expose sensitive data or execute arbitrary code.
SHAP (words)
FactoryTalk Linx versions 6. 00 6. 10 and 6. 11 RSLinx Classic v4. 11. 00 and prior Connected Components Workbench: Version 12 and prior ControlFLASH: Version 14 and later ControlFLASH Plus: Version 1 and later FactoryTalk Asset Centre: Version 9 and later FactoryTalk Linx CommDTM: Version 1 and later Studio 5000 Launcher: Version 31 and later Stud 5000 Logix Designer software: Version 32 and prior is vulnerable. The parsing mechanism that processes certain file types does not provide input sanitation. This may allow an attacker to use specially crafted files to traverse the file system and modify or expose sensitive data or execute arbitrary code
#53 · cve_id CVE-2021-23225 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
Cacti ▁1 . 1 . 38 ▁allows authenticated ▁users ▁with User Manage ment permissions ▁to inject ▁arbitrary ▁web sc ▁rip t ▁or HTML ▁in ▁the " new _ username " ▁field ▁during ▁creation ▁of ▁a ▁new ▁user ▁via " Copy " ▁method ▁at ▁user _ admin . php . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
Cacti 1.1.38 allows authenticated users with User Management permissions to inject arbitrary web script or HTML in the "new_username" field during creation of a new user via "Copy" method at user_admin.php.
SHAP (words)
Cacti 1. 1. 38 allows authenticated users with User Management permissions to inject arbitrary web script or HTML in the " new_username" field during creation of a new user via " Copy" method at user_admin. php
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Cacti 1 . 1 . 38 allows authenticated users with User Manage men ##t permissions to inject arbitrary web sc r ip t or HTML in the " new _ username " field d uri ng creation of a new user via " Copy " method at user _ admin . php . [SEP]
LRP (+Pred, pos-only)
[CLS] Cacti 1 . 1 . 38 allows authenticated users with User Manage men ##t permissions to inject arbitrary web sc r ip t or HTML in the " new _ username " field d uri ng creation of a new user via " Copy " method at user _ admin . php . [SEP]
LIME (words)
Cacti 1.1.38 allows authenticated users with User Management permissions to inject arbitrary web script or HTML in the "new_username" field during creation of a new user via "Copy" method at user_admin.php.
SHAP (words)
Cacti 1. 1. 38 allows authenticated users with User Management permissions to inject arbitrary web script or HTML in the " new_username" field during creation of a new user via " Copy" method at user_admin. php
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Cacti 1 . 1 . 38 allows authenticated users with User Manage men ##t permissions to inject arbitrary web sc r ip t or HTML in the " new _ username " field d uri ng creation of a new user via " Copy " method at user _ admin . php . [SEP]
LRP (+Pred, pos-only)
[CLS] Cacti 1 . 1 . 38 allows authenticated users with User Manage men ##t permissions to inject arbitrary web sc r ip t or HTML in the " new _ username " field d uri ng creation of a new user via " Copy " method at user _ admin . php . [SEP]
LIME (words)
Cacti 1.1.38 allows authenticated users with User Management permissions to inject arbitrary web script or HTML in the "new_username" field during creation of a new user via "Copy" method at user_admin.php.
SHAP (words)
Cacti 1. 1. 38 allows authenticated users with User Management permissions to inject arbitrary web script or HTML in the " new_username" field during creation of a new user via " Copy" method at user_admin. php
#54 · cve_id CVE-2022-43528 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁Under ▁certain ▁configuration s ▁an ▁attacker ▁can login ▁to Aruba EdgeConnect ▁Enterprise Orchestrator ▁without ▁supplying ▁a ▁multi - factor authentication ▁code . Successful ▁exploitation ▁allows ▁an ▁attacker ▁to login ▁using ▁only ▁a username ▁and ▁password ▁and ▁successfully ▁bypass MFA ▁requirements ▁in Aruba EdgeConnect ▁Enterprise Orchestration ▁Software ▁version ( s ) : Aruba EdgeConnect ▁Enterprise Orchestrator ( on-premise s ) Aruba EdgeConnect ▁Enterprise Orchestrator - as - a - Service Aruba EdgeConnect ▁Enterprise Orchestrator - SP ▁and Aruba EdgeConnect ▁Enterprise Orchestrator ▁Global ▁Enterprise ▁Ten ant Orchestrator s - Orchestrator ▁9 . 2 . 1 . 40 179 ▁and ▁below - Orchestrator ▁9 . 1 . 4 . 40 4 36 ▁and ▁below - Orchestrator ▁9 . 0 . 7 . 40 110 ▁and ▁below - Orchestrator ▁8 . 10 . 23 . 400 15 ▁and ▁below - ▁Any ▁older ▁branches ▁of Orchestrator ▁not spec ▁if ically ▁mentioned . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
Under certain configurations an attacker can login to Aruba EdgeConnect Enterprise Orchestrator without supplying a multi-factor authentication code. Successful exploitation allows an attacker to login using only a username and password and successfully bypass MFA requirements in Aruba EdgeConnect Enterprise Orchestration Software version(s): Aruba EdgeConnect Enterprise Orchestrator (on-premises) Aruba EdgeConnect Enterprise Orchestrator-as-a-Service Aruba EdgeConnect Enterprise Orchestrator-SP and Aruba EdgeConnect Enterprise Orchestrator Global Enterprise Tenant Orchestrators - Orchestrator 9.2.1.40179 and below - Orchestrator 9.1.4.40436 and below - Orchestrator 9.0.7.40110 and below - Orchestrator 8.10.23.40015 and below - Any older branches of Orchestrator not specifically mentioned.
SHAP (words)
Under certain configurations an attacker can login to Aruba EdgeConnect Enterprise Orchestrator without supplying a multi- factor authentication code. Successful exploitation allows an attacker to login using only a username and password and successfully bypass MFA requirements in Aruba EdgeConnect Enterprise Orchestration Software version( s): Aruba EdgeConnect Enterprise Orchestrator ( on- premises) Aruba EdgeConnect Enterprise Orchestrator- as- a- Service Aruba EdgeConnect Enterprise Orchestrator- SP and Aruba EdgeConnect Enterprise Orchestrator Global Enterprise Tenant Orchestrators - Orchestrator 9. 2. 1. 40179 and below - Orchestrator 9. 1. 4. 40436 and below - Orchestrator 9. 0. 7. 40110 and below - Orchestrator 8. 10. 23. 40015 and below - Any older branches of Orchestrator not specifically mentioned
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Under certain config u ##rations an attacker can login to Aruba EdgeConnect Enterprise Orchestrator without supplying a multi - factor authentication code . Successful exploitation allows an attacker to login using only a username and password and successfully bypass MFA requirements in Aruba EdgeConnect Enterprise Orchestration Software version ( s ) : Aruba EdgeConnect Enterprise Orchestrator ( on-premise s ) Aruba EdgeConnect Enterprise Orchestrator - as - a - Service Aruba EdgeConnect Enterprise Orchestrator - SP and Aruba EdgeConnect Enterprise Orchestrator Global Enterprise Ten ##ant Orchestrator s - Orchestrator 9 . 2 . 1 . 401 ##7 ##9 and below - Orchestrator 9 . 1 . 4 . 404 ##36 and below - Orchestrator 9 . 0 . 7 . 401 ##10 and below - Orchestrator 8 . 10 . 23 . 400 ##15 and below - Any older branches of Orchestrator not spec if ##ically mentioned . [SEP]
LRP (+Pred, pos-only)
[CLS] Under certain config u ##rations an attacker can login to Aruba EdgeConnect Enterprise Orchestrator without supplying a multi - factor authentication code . Successful exploitation allows an attacker to login using only a username and password and successfully bypass MFA requirements in Aruba EdgeConnect Enterprise Orchestration Software version ( s ) : Aruba EdgeConnect Enterprise Orchestrator ( on-premise s ) Aruba EdgeConnect Enterprise Orchestrator - as - a - Service Aruba EdgeConnect Enterprise Orchestrator - SP and Aruba EdgeConnect Enterprise Orchestrator Global Enterprise Ten ##ant Orchestrator s - Orchestrator 9 . 2 . 1 . 401 ##7 ##9 and below - Orchestrator 9 . 1 . 4 . 404 ##36 and below - Orchestrator 9 . 0 . 7 . 401 ##10 and below - Orchestrator 8 . 10 . 23 . 400 ##15 and below - Any older branches of Orchestrator not spec if ##ically mentioned . [SEP]
LIME (words)
Under certain configurations an attacker can login to Aruba EdgeConnect Enterprise Orchestrator without supplying a multi-factor authentication code. Successful exploitation allows an attacker to login using only a username and password and successfully bypass MFA requirements in Aruba EdgeConnect Enterprise Orchestration Software version(s): Aruba EdgeConnect Enterprise Orchestrator (on-premises) Aruba EdgeConnect Enterprise Orchestrator-as-a-Service Aruba EdgeConnect Enterprise Orchestrator-SP and Aruba EdgeConnect Enterprise Orchestrator Global Enterprise Tenant Orchestrators - Orchestrator 9.2.1.40179 and below - Orchestrator 9.1.4.40436 and below - Orchestrator 9.0.7.40110 and below - Orchestrator 8.10.23.40015 and below - Any older branches of Orchestrator not specifically mentioned.
SHAP (words)
Under certain configurations an attacker can login to Aruba EdgeConnect Enterprise Orchestrator without supplying a multi- factor authentication code. Successful exploitation allows an attacker to login using only a username and password and successfully bypass MFA requirements in Aruba EdgeConnect Enterprise Orchestration Software version( s): Aruba EdgeConnect Enterprise Orchestrator ( on- premises) Aruba EdgeConnect Enterprise Orchestrator- as- a- Service Aruba EdgeConnect Enterprise Orchestrator- SP and Aruba EdgeConnect Enterprise Orchestrator Global Enterprise Tenant Orchestrators - Orchestrator 9. 2. 1. 40179 and below - Orchestrator 9. 1. 4. 40436 and below - Orchestrator 9. 0. 7. 40110 and below - Orchestrator 8. 10. 23. 40015 and below - Any older branches of Orchestrator not specifically mentioned
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Under certain config u ##rations an attacker can login to Aruba EdgeConnect Enterprise Orchestrator without supplying a multi - factor authentication code . Successful exploitation allows an attacker to login using only a username and password and successfully bypass MFA requirements in Aruba EdgeConnect Enterprise Orchestration Software version ( s ) : Aruba EdgeConnect Enterprise Orchestrator ( on-premise s ) Aruba EdgeConnect Enterprise Orchestrator - as - a - Service Aruba EdgeConnect Enterprise Orchestrator - SP and Aruba EdgeConnect Enterprise Orchestrator Global Enterprise Ten ##ant Orchestrator s - Orchestrator 9 . 2 . 1 . 401 ##7 ##9 and below - Orchestrator 9 . 1 . 4 . 404 ##36 and below - Orchestrator 9 . 0 . 7 . 401 ##10 and below - Orchestrator 8 . 10 . 23 . 400 ##15 and below - Any older branches of Orchestrator not spec if ##ically mentioned . [SEP]
LRP (+Pred, pos-only)
[CLS] Under certain config u ##rations an attacker can login to Aruba EdgeConnect Enterprise Orchestrator without supplying a multi - factor authentication code . Successful exploitation allows an attacker to login using only a username and password and successfully bypass MFA requirements in Aruba EdgeConnect Enterprise Orchestration Software version ( s ) : Aruba EdgeConnect Enterprise Orchestrator ( on-premise s ) Aruba EdgeConnect Enterprise Orchestrator - as - a - Service Aruba EdgeConnect Enterprise Orchestrator - SP and Aruba EdgeConnect Enterprise Orchestrator Global Enterprise Ten ##ant Orchestrator s - Orchestrator 9 . 2 . 1 . 401 ##7 ##9 and below - Orchestrator 9 . 1 . 4 . 404 ##36 and below - Orchestrator 9 . 0 . 7 . 401 ##10 and below - Orchestrator 8 . 10 . 23 . 400 ##15 and below - Any older branches of Orchestrator not spec if ##ically mentioned . [SEP]
LIME (words)
Under certain configurations an attacker can login to Aruba EdgeConnect Enterprise Orchestrator without supplying a multi-factor authentication code. Successful exploitation allows an attacker to login using only a username and password and successfully bypass MFA requirements in Aruba EdgeConnect Enterprise Orchestration Software version(s): Aruba EdgeConnect Enterprise Orchestrator (on-premises) Aruba EdgeConnect Enterprise Orchestrator-as-a-Service Aruba EdgeConnect Enterprise Orchestrator-SP and Aruba EdgeConnect Enterprise Orchestrator Global Enterprise Tenant Orchestrators - Orchestrator 9.2.1.40179 and below - Orchestrator 9.1.4.40436 and below - Orchestrator 9.0.7.40110 and below - Orchestrator 8.10.23.40015 and below - Any older branches of Orchestrator not specifically mentioned.
SHAP (words)
Under certain configurations an attacker can login to Aruba EdgeConnect Enterprise Orchestrator without supplying a multi- factor authentication code. Successful exploitation allows an attacker to login using only a username and password and successfully bypass MFA requirements in Aruba EdgeConnect Enterprise Orchestration Software version( s): Aruba EdgeConnect Enterprise Orchestrator ( on- premises) Aruba EdgeConnect Enterprise Orchestrator- as- a- Service Aruba EdgeConnect Enterprise Orchestrator- SP and Aruba EdgeConnect Enterprise Orchestrator Global Enterprise Tenant Orchestrators - Orchestrator 9. 2. 1. 40179 and below - Orchestrator 9. 1. 4. 40436 and below - Orchestrator 9. 0. 7. 40110 and below - Orchestrator 8. 10. 23. 40015 and below - Any older branches of Orchestrator not specifically mentioned
#55 · cve_id CVE-2022-22666 · av
GT=LOCAL (2)
xlnet · Pred=LOCAL (2) · p=0.99 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁A ▁memory ▁corruption ▁issue ▁was ▁addressed ▁with ▁improved validation . ▁This ▁issue ▁is ▁fixed ▁in tvOS ▁15 . 4 ▁iOS ▁15 . 4 ▁and iPadOS ▁15 . 4 watchOS ▁8 . 5 . Processing ▁a maliciously ▁crafted ▁image ▁may ▁lead ▁to ▁heap ▁corruption . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
A memory corruption issue was addressed with improved validation. This issue is fixed in tvOS 15.4 iOS 15.4 and iPadOS 15.4 watchOS 8.5. Processing a maliciously crafted image may lead to heap corruption.
SHAP (words)
A memory corruption issue was addressed with improved validation. This issue is fixed in tvOS 15. 4 iOS 15. 4 and iPadOS 15. 4 watchOS 8. 5. Processing a maliciously crafted image may lead to heap corruption
lrp-bert · Pred=LOCAL (2) · p=0.99 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] A memory corruption issue was addressed with improved validation . This issue is fixed in tvOS 15 . 4 iOS 15 . 4 and iPadOS 15 . 4 watchOS 8 . 5 . Processing a maliciously crafted image may lead to heap corruption . [SEP]
LRP (+Pred, pos-only)
[CLS] A memory corruption issue was addressed with improved validation . This issue is fixed in tvOS 15 . 4 iOS 15 . 4 and iPadOS 15 . 4 watchOS 8 . 5 . Processing a maliciously crafted image may lead to heap corruption . [SEP]
LIME (words)
A memory corruption issue was addressed with improved validation. This issue is fixed in tvOS 15.4 iOS 15.4 and iPadOS 15.4 watchOS 8.5. Processing a maliciously crafted image may lead to heap corruption.
SHAP (words)
A memory corruption issue was addressed with improved validation. This issue is fixed in tvOS 15. 4 iOS 15. 4 and iPadOS 15. 4 watchOS 8. 5. Processing a maliciously crafted image may lead to heap corruption
lrp-distilbert · Pred=LOCAL (2) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] A memory corruption issue was addressed with improved validation . This issue is fixed in tvOS 15 . 4 iOS 15 . 4 and iPadOS 15 . 4 watchOS 8 . 5 . Processing a maliciously crafted image may lead to heap corruption . [SEP]
LRP (+Pred, pos-only)
[CLS] A memory corruption issue was addressed with improved validation . This issue is fixed in tvOS 15 . 4 iOS 15 . 4 and iPadOS 15 . 4 watchOS 8 . 5 . Processing a maliciously crafted image may lead to heap corruption . [SEP]
LIME (words)
A memory corruption issue was addressed with improved validation. This issue is fixed in tvOS 15.4 iOS 15.4 and iPadOS 15.4 watchOS 8.5. Processing a maliciously crafted image may lead to heap corruption.
SHAP (words)
A memory corruption issue was addressed with improved validation. This issue is fixed in tvOS 15. 4 iOS 15. 4 and iPadOS 15. 4 watchOS 8. 5. Processing a maliciously crafted image may lead to heap corruption
#56 · cve_id CVE-2021-37705 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁One Fu zz ▁is ▁an ▁open ▁source self-hosted ▁Fu zz ing - As - A - Service ▁platform . ▁Starting ▁with ▁One Fu zz ▁2 . 12 . 0 ▁or ▁greater ▁an ▁incomplete auth ▁or ization ▁check ▁allows ▁an authenticated ▁user ▁from ▁any Azure ▁Active ▁Directory ▁tenant ▁to ▁make authorize d ▁API ▁calls ▁to ▁a ▁vulnerable ▁One Fu zz ▁instance . ▁To ▁be ▁vulnerable ▁a ▁One Fu zz ▁deployment ▁must ▁be ▁both ▁version ▁2 . 12 . 0 ▁or ▁greater ▁and ▁deployed ▁with ▁the non-default - - multi _ ten ant _ do main ▁option . ▁This ▁can ▁result ▁in ▁read / write ▁access ▁to ▁private ▁data ▁such ▁as ▁software ▁vulnerability ▁and ▁crash ▁in for matio n ▁security ▁testing ▁tools ▁and ▁proprietary ▁code ▁and ▁symbols . ▁Via authorize d ▁API ▁calls ▁this ▁also ▁enables tampering ▁with ▁existing ▁data ▁and unauthorized ▁code ▁execution ▁on Azure compute ▁resources . ▁This ▁issue ▁is ▁resolved ▁starting ▁in ▁release ▁2 . 31 . 0 ▁via ▁the ▁addition ▁of ▁application - level ▁check ▁of ▁the bearer ▁token ' s ▁` issue r ` ▁against ▁an admin ▁is t rator -c ▁on figur ed ▁allow list . ▁As ▁a workaround ▁users ▁can ▁restrict ▁access ▁to ▁the ▁tenant ▁of ▁a ▁deployed ▁One Fu zz ▁instance ▁< ▁2 . 31 . 0 ▁by ▁red ep loy ing ▁in ▁the ▁default ▁configuration ▁which omits ▁the ▁` - - multi _ ten ant _ do main ` ▁option . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
OneFuzz is an open source self-hosted Fuzzing-As-A-Service platform. Starting with OneFuzz 2.12.0 or greater an incomplete authorization check allows an authenticated user from any Azure Active Directory tenant to make authorized API calls to a vulnerable OneFuzz instance. To be vulnerable a OneFuzz deployment must be both version 2.12.0 or greater and deployed with the non-default --multi_tenant_domain option. This can result in read/write access to private data such as software vulnerability and crash information security testing tools and proprietary code and symbols. Via authorized API calls this also enables tampering with existing data and unauthorized code execution on Azure compute resources. This issue is resolved starting in release 2.31.0 via the addition of application-level check of the bearer token's `issuer` against an administrator-configured allowlist. As a workaround users can restrict access to the tenant of a deployed OneFuzz instance < 2.31.0 by redeploying in the default configuration which omits the `--multi_tenant_domain` option.
SHAP (words)
OneFuzz is an open source self- hosted Fuzzing- As- A- Service platform. Starting with OneFuzz 2. 12. 0 or greater an incomplete authorization check allows an authenticated user from any Azure Active Directory tenant to make authorized API calls to a vulnerable OneFuzz instance. To be vulnerable a OneFuzz deployment must be both version 2. 12. 0 or greater and deployed with the non- default -- multi_tenant_domain option. This can result in read/ write access to private data such as software vulnerability and crash information security testing tools and proprietary code and symbols. Via authorized API calls this also enables tampering with existing data and unauthorized code execution on Azure compute resources. This issue is resolved starting in release 2. 31. 0 via the addition of application- level check of the bearer token' s ` issuer` against an administrator- configured allowlist. As a workaround users can restrict access to the tenant of a deployed OneFuzz instance < 2. 31. 0 by redeploying in the default configuration which omits the `-- multi_tenant_domain` option
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] One ##F ##uz ##z is an open source self-hosted Fu ##zzi ##ng - As - A - Service platform . S tar tin ##g with One ##F ##uz ##z 2 . 12 . 0 or greater an incomplete auth or ##ization check allows an authenticated user from any Azure Active Directory tenant to make authorize d A PI calls to a vulnerable One ##F ##uz ##z instance . To be vulnerable a One ##F ##uz ##z deployment must be bot h version 2 . 12 . 0 or greater and deployed with the non-default - - multi _ tenant _ domain option . This can result in read / w ##r ite access to private data such as software vulnerability and crash info ##r matio n se ##c uri t ##y testing tools and prop ##rie tar y code and symbols . Via authorize d A PI calls this also enables tampering with existing data and unauthorized code exec u ##tion on Azure compute resources . This issue is resolved s tar tin ##g in release 2 . 31 . 0 via the addition of application - level check of the bearer token ' s ` issue ##r ` against an admin is ##tra ##tor -c on ##figured allow ##list . As a workaround users can restrict access to the tenant of a deployed One ##F ##uz ##z instance < 2 . 31 . 0 by red ##ep ##loy ##ing in the default config u ##ration which omits the ` - - multi _ tenant _ domain ` option . [SEP]
LRP (+Pred, pos-only)
[CLS] One ##F ##uz ##z is an open source self-hosted Fu ##zzi ##ng - As - A - Service platform . S tar tin ##g with One ##F ##uz ##z 2 . 12 . 0 or greater an incomplete auth or ##ization check allows an authenticated user from any Azure Active Directory tenant to make authorize d A PI calls to a vulnerable One ##F ##uz ##z instance . To be vulnerable a One ##F ##uz ##z deployment must be bot h version 2 . 12 . 0 or greater and deployed with the non-default - - multi _ tenant _ domain option . This can result in read / w ##r ite access to private data such as software vulnerability and crash info ##r matio n se ##c uri t ##y testing tools and prop ##rie tar y code and symbols . Via authorize d A PI calls this also enables tampering with existing data and unauthorized code exec u ##tion on Azure compute resources . This issue is resolved s tar tin ##g in release 2 . 31 . 0 via the addition of application - level check of the bearer token ' s ` issue ##r ` against an admin is ##tra ##tor -c on ##figured allow ##list . As a workaround users can restrict access to the tenant of a deployed One ##F ##uz ##z instance < 2 . 31 . 0 by red ##ep ##loy ##ing in the default config u ##ration which omits the ` - - multi _ tenant _ domain ` option . [SEP]
LIME (words)
OneFuzz is an open source self-hosted Fuzzing-As-A-Service platform. Starting with OneFuzz 2.12.0 or greater an incomplete authorization check allows an authenticated user from any Azure Active Directory tenant to make authorized API calls to a vulnerable OneFuzz instance. To be vulnerable a OneFuzz deployment must be both version 2.12.0 or greater and deployed with the non-default --multi_tenant_domain option. This can result in read/write access to private data such as software vulnerability and crash information security testing tools and proprietary code and symbols. Via authorized API calls this also enables tampering with existing data and unauthorized code execution on Azure compute resources. This issue is resolved starting in release 2.31.0 via the addition of application-level check of the bearer token's `issuer` against an administrator-configured allowlist. As a workaround users can restrict access to the tenant of a deployed OneFuzz instance < 2.31.0 by redeploying in the default configuration which omits the `--multi_tenant_domain` option.
SHAP (words)
OneFuzz is an open source self- hosted Fuzzing- As- A- Service platform. Starting with OneFuzz 2. 12. 0 or greater an incomplete authorization check allows an authenticated user from any Azure Active Directory tenant to make authorized API calls to a vulnerable OneFuzz instance. To be vulnerable a OneFuzz deployment must be both version 2. 12. 0 or greater and deployed with the non- default -- multi_tenant_domain option. This can result in read/ write access to private data such as software vulnerability and crash information security testing tools and proprietary code and symbols. Via authorized API calls this also enables tampering with existing data and unauthorized code execution on Azure compute resources. This issue is resolved starting in release 2. 31. 0 via the addition of application- level check of the bearer token' s ` issuer` against an administrator- configured allowlist. As a workaround users can restrict access to the tenant of a deployed OneFuzz instance < 2. 31. 0 by redeploying in the default configuration which omits the `-- multi_tenant_domain` option
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] One ##F ##uz ##z is an open source self-hosted Fu ##zzi ##ng - As - A - Service platform . S tar tin ##g with One ##F ##uz ##z 2 . 12 . 0 or greater an incomplete auth or ##ization check allows an authenticated user from any Azure Active Directory tenant to make authorize d A PI calls to a vulnerable One ##F ##uz ##z instance . To be vulnerable a One ##F ##uz ##z deployment must be bot h version 2 . 12 . 0 or greater and deployed with the non-default - - multi _ tenant _ domain option . This can result in read / w ##r ite access to private data such as software vulnerability and crash info ##r matio n se ##c uri t ##y testing tools and prop ##rie tar y code and symbols . Via authorize d A PI calls this also enables tampering with existing data and unauthorized code exec u ##tion on Azure compute resources . This issue is resolved s tar tin ##g in release 2 . 31 . 0 via the addition of application - level check of the bearer token ' s ` issue ##r ` against an admin is ##tra ##tor -c on ##figured allow ##list . As a workaround users can restrict access to the tenant of a deployed One ##F ##uz ##z instance < 2 . 31 . 0 by red ##ep ##loy ##ing in the default config u ##ration which omits the ` - - multi _ tenant _ domain ` option . [SEP]
LRP (+Pred, pos-only)
[CLS] One ##F ##uz ##z is an open source self-hosted Fu ##zzi ##ng - As - A - Service platform . S tar tin ##g with One ##F ##uz ##z 2 . 12 . 0 or greater an incomplete auth or ##ization check allows an authenticated user from any Azure Active Directory tenant to make authorize d A PI calls to a vulnerable One ##F ##uz ##z instance . To be vulnerable a One ##F ##uz ##z deployment must be bot h version 2 . 12 . 0 or greater and deployed with the non-default - - multi _ tenant _ domain option . This can result in read / w ##r ite access to private data such as software vulnerability and crash info ##r matio n se ##c uri t ##y testing tools and prop ##rie tar y code and symbols . Via authorize d A PI calls this also enables tampering with existing data and unauthorized code exec u ##tion on Azure compute resources . This issue is resolved s tar tin ##g in release 2 . 31 . 0 via the addition of application - level check of the bearer token ' s ` issue ##r ` against an admin is ##tra ##tor -c on ##figured allow ##list . As a workaround users can restrict access to the tenant of a deployed One ##F ##uz ##z instance < 2 . 31 . 0 by red ##ep ##loy ##ing in the default config u ##ration which omits the ` - - multi _ tenant _ domain ` option . [SEP]
LIME (words)
OneFuzz is an open source self-hosted Fuzzing-As-A-Service platform. Starting with OneFuzz 2.12.0 or greater an incomplete authorization check allows an authenticated user from any Azure Active Directory tenant to make authorized API calls to a vulnerable OneFuzz instance. To be vulnerable a OneFuzz deployment must be both version 2.12.0 or greater and deployed with the non-default --multi_tenant_domain option. This can result in read/write access to private data such as software vulnerability and crash information security testing tools and proprietary code and symbols. Via authorized API calls this also enables tampering with existing data and unauthorized code execution on Azure compute resources. This issue is resolved starting in release 2.31.0 via the addition of application-level check of the bearer token's `issuer` against an administrator-configured allowlist. As a workaround users can restrict access to the tenant of a deployed OneFuzz instance < 2.31.0 by redeploying in the default configuration which omits the `--multi_tenant_domain` option.
SHAP (words)
OneFuzz is an open source self- hosted Fuzzing- As- A- Service platform. Starting with OneFuzz 2. 12. 0 or greater an incomplete authorization check allows an authenticated user from any Azure Active Directory tenant to make authorized API calls to a vulnerable OneFuzz instance. To be vulnerable a OneFuzz deployment must be both version 2. 12. 0 or greater and deployed with the non- default -- multi_tenant_domain option. This can result in read/ write access to private data such as software vulnerability and crash information security testing tools and proprietary code and symbols. Via authorized API calls this also enables tampering with existing data and unauthorized code execution on Azure compute resources. This issue is resolved starting in release 2. 31. 0 via the addition of application- level check of the bearer token' s ` issuer` against an administrator- configured allowlist. As a workaround users can restrict access to the tenant of a deployed OneFuzz instance < 2. 31. 0 by redeploying in the default configuration which omits the `-- multi_tenant_domain` option
#57 · cve_id CVE-2023-28950 · av
GT=LOCAL (2)
xlnet · Pred=NETWORK (0) · p=0.99 MIS
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁IBM MQ ▁8 . 0 ▁9 . 0 ▁9 . 1 ▁9 . 2 ▁and ▁9 . 3 ▁could disclose ▁sensitive ▁user ▁in for matio n ▁from ▁a ▁trace ▁file ▁if ▁that ▁functionality ▁has ▁been ▁enabled . ▁IBM X-Force ▁ID : ▁25 13 58 . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
IBM MQ 8.0 9.0 9.1 9.2 and 9.3 could disclose sensitive user information from a trace file if that functionality has been enabled. IBM X-Force ID: 251358.
SHAP (words)
IBM MQ 8. 0 9. 0 9. 1 9. 2 and 9. 3 could disclose sensitive user information from a trace file if that functionality has been enabled. IBM X- Force ID: 251358
lrp-bert · Pred=NETWORK (0) · p=1.00 MIS
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] I BM MQ 8 . 0 9 . 0 9 . 1 9 . 2 and 9 . 3 could disclose sensitive user info ##r matio n from a trace file if that functionality has been enabled . I BM X-Force ID : 251 ##35 ##8 . [SEP]
LRP (+Pred, pos-only)
[CLS] I BM MQ 8 . 0 9 . 0 9 . 1 9 . 2 and 9 . 3 could disclose sensitive user info ##r matio n from a trace file if that functionality has been enabled . I BM X-Force ID : 251 ##35 ##8 . [SEP]
LIME (words)
IBM MQ 8.0 9.0 9.1 9.2 and 9.3 could disclose sensitive user information from a trace file if that functionality has been enabled. IBM X-Force ID: 251358.
SHAP (words)
IBM MQ 8. 0 9. 0 9. 1 9. 2 and 9. 3 could disclose sensitive user information from a trace file if that functionality has been enabled. IBM X- Force ID: 251358
lrp-distilbert · Pred=NETWORK (0) · p=0.98 MIS
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] I BM MQ 8 . 0 9 . 0 9 . 1 9 . 2 and 9 . 3 could disclose sensitive user info ##r matio n from a trace file if that functionality has been enabled . I BM X-Force ID : 251 ##35 ##8 . [SEP]
LRP (+Pred, pos-only)
[CLS] I BM MQ 8 . 0 9 . 0 9 . 1 9 . 2 and 9 . 3 could disclose sensitive user info ##r matio n from a trace file if that functionality has been enabled . I BM X-Force ID : 251 ##35 ##8 . [SEP]
LIME (words)
IBM MQ 8.0 9.0 9.1 9.2 and 9.3 could disclose sensitive user information from a trace file if that functionality has been enabled. IBM X-Force ID: 251358.
SHAP (words)
IBM MQ 8. 0 9. 0 9. 1 9. 2 and 9. 3 could disclose sensitive user information from a trace file if that functionality has been enabled. IBM X- Force ID: 251358
#58 · cve_id CVE-2023-40072 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=0.99 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁OS ▁command inject ion ▁vulnerability ▁in ELECOM ▁network ▁devices ▁allows ▁an authenticated ▁user ▁to ▁execute ▁an ▁arbitrary ▁OS ▁command ▁by ▁sending ▁a spec i ally ▁crafted ▁request . Affected ▁products ▁and ▁versions ▁are ▁as ▁follows : ▁W AB - S 600 - PS ▁all ▁versions ▁W AB - S 300 ▁all ▁versions ▁W AB - M 17 75 - PS ▁v 1 . 1 . 21 ▁and ▁earlier ▁W AB - S 17 75 ▁v 1 . 1 . 9 ▁and ▁earlier ▁W AB - S 11 67 ▁v 1 . 0 . 7 ▁and ▁earlier ▁and ▁W AB - M 21 33 ▁v 1 . 3 . 22 ▁and ▁earlier . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
OS command injection vulnerability in ELECOM network devices allows an authenticated user to execute an arbitrary OS command by sending a specially crafted request. Affected products and versions are as follows: WAB-S600-PS all versions WAB-S300 all versions WAB-M1775-PS v1.1.21 and earlier WAB-S1775 v1.1.9 and earlier WAB-S1167 v1.0.7 and earlier and WAB-M2133 v1.3.22 and earlier.
SHAP (words)
OS command injection vulnerability in ELECOM network devices allows an authenticated user to execute an arbitrary OS command by sending a specially crafted request. Affected products and versions are as follows: WAB- S600- PS all versions WAB- S300 all versions WAB- M1775- PS v1. 1. 21 and earlier WAB- S1775 v1. 1. 9 and earlier WAB- S1167 v1. 0. 7 and earlier and WAB- M2133 v1. 3. 22 and earlier
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] OS command inject ion vulnerability in ELECOM network dev ice ##s allows an authenticated user to exec u ##te an arbitrary OS command by sending a spec i ##ally crafted request . Affected products and versions are as follows : WA ##B - S ##60 ##0 - PS all versions WA ##B - S ##30 ##0 all versions WA ##B - M1 ##7 ##75 - PS v ##1 . 1 . 21 and earlier WA ##B - S ##17 ##75 v ##1 . 1 . 9 and earlier WA ##B - S ##11 ##6 ##7 v ##1 . 0 . 7 and earlier and WA ##B - M ##21 ##33 v ##1 . 3 . 22 and earlier . [SEP]
LRP (+Pred, pos-only)
[CLS] OS command inject ion vulnerability in ELECOM network dev ice ##s allows an authenticated user to exec u ##te an arbitrary OS command by sending a spec i ##ally crafted request . Affected products and versions are as follows : WA ##B - S ##60 ##0 - PS all versions WA ##B - S ##30 ##0 all versions WA ##B - M1 ##7 ##75 - PS v ##1 . 1 . 21 and earlier WA ##B - S ##17 ##75 v ##1 . 1 . 9 and earlier WA ##B - S ##11 ##6 ##7 v ##1 . 0 . 7 and earlier and WA ##B - M ##21 ##33 v ##1 . 3 . 22 and earlier . [SEP]
LIME (words)
OS command injection vulnerability in ELECOM network devices allows an authenticated user to execute an arbitrary OS command by sending a specially crafted request. Affected products and versions are as follows: WAB-S600-PS all versions WAB-S300 all versions WAB-M1775-PS v1.1.21 and earlier WAB-S1775 v1.1.9 and earlier WAB-S1167 v1.0.7 and earlier and WAB-M2133 v1.3.22 and earlier.
SHAP (words)
OS command injection vulnerability in ELECOM network devices allows an authenticated user to execute an arbitrary OS command by sending a specially crafted request. Affected products and versions are as follows: WAB- S600- PS all versions WAB- S300 all versions WAB- M1775- PS v1. 1. 21 and earlier WAB- S1775 v1. 1. 9 and earlier WAB- S1167 v1. 0. 7 and earlier and WAB- M2133 v1. 3. 22 and earlier
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] OS command inject ion vulnerability in ELECOM network dev ice ##s allows an authenticated user to exec u ##te an arbitrary OS command by sending a spec i ##ally crafted request . Affected products and versions are as follows : WA ##B - S ##60 ##0 - PS all versions WA ##B - S ##30 ##0 all versions WA ##B - M1 ##7 ##75 - PS v ##1 . 1 . 21 and earlier WA ##B - S ##17 ##75 v ##1 . 1 . 9 and earlier WA ##B - S ##11 ##6 ##7 v ##1 . 0 . 7 and earlier and WA ##B - M ##21 ##33 v ##1 . 3 . 22 and earlier . [SEP]
LRP (+Pred, pos-only)
[CLS] OS command inject ion vulnerability in ELECOM network dev ice ##s allows an authenticated user to exec u ##te an arbitrary OS command by sending a spec i ##ally crafted request . Affected products and versions are as follows : WA ##B - S ##60 ##0 - PS all versions WA ##B - S ##30 ##0 all versions WA ##B - M1 ##7 ##75 - PS v ##1 . 1 . 21 and earlier WA ##B - S ##17 ##75 v ##1 . 1 . 9 and earlier WA ##B - S ##11 ##6 ##7 v ##1 . 0 . 7 and earlier and WA ##B - M ##21 ##33 v ##1 . 3 . 22 and earlier . [SEP]
LIME (words)
OS command injection vulnerability in ELECOM network devices allows an authenticated user to execute an arbitrary OS command by sending a specially crafted request. Affected products and versions are as follows: WAB-S600-PS all versions WAB-S300 all versions WAB-M1775-PS v1.1.21 and earlier WAB-S1775 v1.1.9 and earlier WAB-S1167 v1.0.7 and earlier and WAB-M2133 v1.3.22 and earlier.
SHAP (words)
OS command injection vulnerability in ELECOM network devices allows an authenticated user to execute an arbitrary OS command by sending a specially crafted request. Affected products and versions are as follows: WAB- S600- PS all versions WAB- S300 all versions WAB- M1775- PS v1. 1. 21 and earlier WAB- S1775 v1. 1. 9 and earlier WAB- S1167 v1. 0. 7 and earlier and WAB- M2133 v1. 3. 22 and earlier
#59 · cve_id CVE-2022-25842 · av
GT=NETWORK (0)
xlnet · Pred=LOCAL (2) · p=0.88 MIS
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁All ▁versions ▁of ▁package ▁com . al iba ba . one agent : one - java - agent - plugin ▁are ▁vulnerable ▁to Arbitrary ▁File Write ▁via ▁Archive ▁Extract ion ( Zip ▁Slip ) ▁using ▁a spec i ally ▁crafted ▁archive ▁that ▁holds ▁directory traversal filenames ( e . g . . . / . . / evil . ex e ) . ▁The ▁attacker ▁can overwrite executable ▁files ▁and ▁either invoke ▁them ▁remotely ▁or ▁wait ▁for ▁the ▁system ▁or ▁user ▁to ▁call ▁them ▁thus ▁achieving ▁remote ▁command ▁execution ▁on ▁the victim’s ▁machine . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
All versions of package com.alibaba.oneagent:one-java-agent-plugin are vulnerable to Arbitrary File Write via Archive Extraction (Zip Slip) using a specially crafted archive that holds directory traversal filenames (e.g. ../../evil.exe). The attacker can overwrite executable files and either invoke them remotely or wait for the system or user to call them thus achieving remote command execution on the victim’s machine.
SHAP (words)
All versions of package com. alibaba. oneagent: one- java- agent- plugin are vulnerable to Arbitrary File Write via Archive Extraction ( Zip Slip) using a specially crafted archive that holds directory traversal filenames ( e. g. ../../ evil. exe). The attacker can overwrite executable files and either invoke them remotely or wait for the system or user to call them thus achieving remote command execution on the victim’ s machine
lrp-bert · Pred=NETWORK (0) · p=0.99 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] All versions of package com . al ##iba ##ba . one ##age ##nt : one - java - agent - plugin are vulnerable to Arbitrary File Write via Archive Extra ##ction ( Zip S ##l ip ) using a spec i ##ally crafted archive that holds directory traversal filenames ( e . g . . . / . . / evil . ex ##e ) . The attacker can overwrite executable files and either invoke them remotely or wait for the system or user to call them thus achieving remote command exec u ##tion on the victim’s machine . [SEP]
LRP (+Pred, pos-only)
[CLS] All versions of package com . al ##iba ##ba . one ##age ##nt : one - java - agent - plugin are vulnerable to Arbitrary File Write via Archive Extra ##ction ( Zip S ##l ip ) using a spec i ##ally crafted archive that holds directory traversal filenames ( e . g . . . / . . / evil . ex ##e ) . The attacker can overwrite executable files and either invoke them remotely or wait for the system or user to call them thus achieving remote command exec u ##tion on the victim’s machine . [SEP]
LIME (words)
All versions of package com.alibaba.oneagent:one-java-agent-plugin are vulnerable to Arbitrary File Write via Archive Extraction (Zip Slip) using a specially crafted archive that holds directory traversal filenames (e.g. ../../evil.exe). The attacker can overwrite executable files and either invoke them remotely or wait for the system or user to call them thus achieving remote command execution on the victim’s machine.
SHAP (words)
All versions of package com. alibaba. oneagent: one- java- agent- plugin are vulnerable to Arbitrary File Write via Archive Extraction ( Zip Slip) using a specially crafted archive that holds directory traversal filenames ( e. g. ../../ evil. exe). The attacker can overwrite executable files and either invoke them remotely or wait for the system or user to call them thus achieving remote command execution on the victim’ s machine
lrp-distilbert · Pred=NETWORK (0) · p=0.78 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] All versions of package com . al ##iba ##ba . one ##age ##nt : one - java - agent - plugin are vulnerable to Arbitrary File Write via Archive Extra ##ction ( Zip S ##l ip ) using a spec i ##ally crafted archive that holds directory traversal filenames ( e . g . . . / . . / evil . ex ##e ) . The attacker can overwrite executable files and either invoke them remotely or wait for the system or user to call them thus achieving remote command exec u ##tion on the victim’s machine . [SEP]
LRP (+Pred, pos-only)
[CLS] All versions of package com . al ##iba ##ba . one ##age ##nt : one - java - agent - plugin are vulnerable to Arbitrary File Write via Archive Extra ##ction ( Zip S ##l ip ) using a spec i ##ally crafted archive that holds directory traversal filenames ( e . g . . . / . . / evil . ex ##e ) . The attacker can overwrite executable files and either invoke them remotely or wait for the system or user to call them thus achieving remote command exec u ##tion on the victim’s machine . [SEP]
LIME (words)
All versions of package com.alibaba.oneagent:one-java-agent-plugin are vulnerable to Arbitrary File Write via Archive Extraction (Zip Slip) using a specially crafted archive that holds directory traversal filenames (e.g. ../../evil.exe). The attacker can overwrite executable files and either invoke them remotely or wait for the system or user to call them thus achieving remote command execution on the victim’s machine.
SHAP (words)
All versions of package com. alibaba. oneagent: one- java- agent- plugin are vulnerable to Arbitrary File Write via Archive Extraction ( Zip Slip) using a specially crafted archive that holds directory traversal filenames ( e. g. ../../ evil. exe). The attacker can overwrite executable files and either invoke them remotely or wait for the system or user to call them thus achieving remote command execution on the victim’ s machine
#60 · cve_id CVE-2016-10051 · av
GT=LOCAL (2)
xlnet · Pred=LOCAL (2) · p=0.49 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
Use-after-free ▁vulnerability ▁in ▁the ▁Read P WP I m age ▁function ▁in coder s / p w p . c ▁in ImageMagick ▁6 . 9 . 5 - 5 ▁allows ▁remote ▁attackers ▁to ▁cause ▁a ▁denial ▁of ▁service ( application ▁crash ) ▁or ▁have ▁other unspecified ▁impact ▁via ▁a ▁crafted ▁file . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
Use-after-free vulnerability in the ReadPWPImage function in coders/pwp.c in ImageMagick 6.9.5-5 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
SHAP (words)
Use- after- free vulnerability in the ReadPWPImage function in coders/ pwp. c in ImageMagick 6. 9. 5- 5 allows remote attackers to cause a denial of service ( application crash) or have other unspecified impact via a crafted file
lrp-bert · Pred=NETWORK (0) · p=0.94 MIS
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Use-after-free vulnerability in the Read ##P WP Image function in coder s / p ##w ##p . c in ImageMagick 6 . 9 . 5 - 5 allows remote attackers to cause a denial of service ( application crash ) or have other unspecified impact via a crafted file . [SEP]
LRP (+Pred, pos-only)
[CLS] Use-after-free vulnerability in the Read ##P WP Image function in coder s / p ##w ##p . c in ImageMagick 6 . 9 . 5 - 5 allows remote attackers to cause a denial of service ( application crash ) or have other unspecified impact via a crafted file . [SEP]
LIME (words)
Use-after-free vulnerability in the ReadPWPImage function in coders/pwp.c in ImageMagick 6.9.5-5 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
SHAP (words)
Use- after- free vulnerability in the ReadPWPImage function in coders/ pwp. c in ImageMagick 6. 9. 5- 5 allows remote attackers to cause a denial of service ( application crash) or have other unspecified impact via a crafted file
lrp-distilbert · Pred=NETWORK (0) · p=0.93 MIS
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Use-after-free vulnerability in the Read ##P WP Image function in coder s / p ##w ##p . c in ImageMagick 6 . 9 . 5 - 5 allows remote attackers to cause a denial of service ( application crash ) or have other unspecified impact via a crafted file . [SEP]
LRP (+Pred, pos-only)
[CLS] Use-after-free vulnerability in the Read ##P WP Image function in coder s / p ##w ##p . c in ImageMagick 6 . 9 . 5 - 5 allows remote attackers to cause a denial of service ( application crash ) or have other unspecified impact via a crafted file . [SEP]
LIME (words)
Use-after-free vulnerability in the ReadPWPImage function in coders/pwp.c in ImageMagick 6.9.5-5 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
SHAP (words)
Use- after- free vulnerability in the ReadPWPImage function in coders/ pwp. c in ImageMagick 6. 9. 5- 5 allows remote attackers to cause a denial of service ( application crash) or have other unspecified impact via a crafted file
#61 · cve_id CVE-2020-27408 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁Open SIS ▁Community ▁Edition ▁through ▁7 . 6 ▁is ▁affected ▁by ▁incorrect ▁access ▁controls ▁for ▁the ▁file Reset User ▁Info . php ▁that ▁allow ▁an unauthenticated ▁attacker ▁to ▁change ▁the ▁password ▁of ▁arbitrary ▁users . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
OpenSIS Community Edition through 7.6 is affected by incorrect access controls for the file ResetUserInfo.php that allow an unauthenticated attacker to change the password of arbitrary users.
SHAP (words)
OpenSIS Community Edition through 7. 6 is affected by incorrect access controls for the file ResetUserInfo. php that allow an unauthenticated attacker to change the password of arbitrary users
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Open ##SI ##S Community Edition through 7 . 6 is affected by incorrect access controls for the file Reset User In ##fo . php that allow an unauthenticated attacker to change the password of arbitrary users . [SEP]
LRP (+Pred, pos-only)
[CLS] Open ##SI ##S Community Edition through 7 . 6 is affected by incorrect access controls for the file Reset User In ##fo . php that allow an unauthenticated attacker to change the password of arbitrary users . [SEP]
LIME (words)
OpenSIS Community Edition through 7.6 is affected by incorrect access controls for the file ResetUserInfo.php that allow an unauthenticated attacker to change the password of arbitrary users.
SHAP (words)
OpenSIS Community Edition through 7. 6 is affected by incorrect access controls for the file ResetUserInfo. php that allow an unauthenticated attacker to change the password of arbitrary users
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Open ##SI ##S Community Edition through 7 . 6 is affected by incorrect access controls for the file Reset User In ##fo . php that allow an unauthenticated attacker to change the password of arbitrary users . [SEP]
LRP (+Pred, pos-only)
[CLS] Open ##SI ##S Community Edition through 7 . 6 is affected by incorrect access controls for the file Reset User In ##fo . php that allow an unauthenticated attacker to change the password of arbitrary users . [SEP]
LIME (words)
OpenSIS Community Edition through 7.6 is affected by incorrect access controls for the file ResetUserInfo.php that allow an unauthenticated attacker to change the password of arbitrary users.
SHAP (words)
OpenSIS Community Edition through 7. 6 is affected by incorrect access controls for the file ResetUserInfo. php that allow an unauthenticated attacker to change the password of arbitrary users
#62 · cve_id CVE-2019-16107 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁Mi ssi ng ▁form ▁token validation ▁in phpBB ▁3 . 2 . 7 ▁allows CSRF ▁in deleting ▁post attachments . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
Missing form token validation in phpBB 3.2.7 allows CSRF in deleting post attachments.
SHAP (words)
Missing form token validation in phpBB 3. 2. 7 allows CSRF in deleting post attachments
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Mi ssi ng form token validation in phpBB 3 . 2 . 7 allows CSRF in deleting post attachments . [SEP]
LRP (+Pred, pos-only)
[CLS] Mi ssi ng form token validation in phpBB 3 . 2 . 7 allows CSRF in deleting post attachments . [SEP]
LIME (words)
Missing form token validation in phpBB 3.2.7 allows CSRF in deleting post attachments.
SHAP (words)
Missing form token validation in phpBB 3. 2. 7 allows CSRF in deleting post attachments
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Mi ssi ng form token validation in phpBB 3 . 2 . 7 allows CSRF in deleting post attachments . [SEP]
LRP (+Pred, pos-only)
[CLS] Mi ssi ng form token validation in phpBB 3 . 2 . 7 allows CSRF in deleting post attachments . [SEP]
LIME (words)
Missing form token validation in phpBB 3.2.7 allows CSRF in deleting post attachments.
SHAP (words)
Missing form token validation in phpBB 3. 2. 7 allows CSRF in deleting post attachments
#63 · cve_id CVE-2022-37958 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁SP NE GO ▁Extend ed ▁Neg oti ation ( NE GO EX ) ▁Security Mechanism Remote ▁Code Execution Vulnerability <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Remote Code Execution Vulnerability
SHAP (words)
SPNEGO Extended Negotiation ( NEGOEX) Security Mechanism Remote Code Execution Vulnerability
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] SP ##NE ##G ##O Extended N ##ego ##tia ##tion ( NE ##G ##O EX ) Se ##c uri t ##y Mechanism Remote Code Execution Vulnerability [SEP]
LRP (+Pred, pos-only)
[CLS] SP ##NE ##G ##O Extended N ##ego ##tia ##tion ( NE ##G ##O EX ) Se ##c uri t ##y Mechanism Remote Code Execution Vulnerability [SEP]
LIME (words)
SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Remote Code Execution Vulnerability
SHAP (words)
SPNEGO Extended Negotiation ( NEGOEX) Security Mechanism Remote Code Execution Vulnerability
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] SP ##NE ##G ##O Extended N ##ego ##tia ##tion ( NE ##G ##O EX ) Se ##c uri t ##y Mechanism Remote Code Execution Vulnerability [SEP]
LRP (+Pred, pos-only)
[CLS] SP ##NE ##G ##O Extended N ##ego ##tia ##tion ( NE ##G ##O EX ) Se ##c uri t ##y Mechanism Remote Code Execution Vulnerability [SEP]
LIME (words)
SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Remote Code Execution Vulnerability
SHAP (words)
SPNEGO Extended Negotiation ( NEGOEX) Security Mechanism Remote Code Execution Vulnerability
#64 · cve_id CVE-2022-26307 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=0.99 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
LibreOffice ▁supports ▁the ▁storage ▁of passwords ▁for ▁web ▁connections ▁in ▁the user’s ▁configuration ▁database . ▁The ▁stored passwords ▁are encrypted ▁with ▁a ▁single ▁master ▁key ▁provided ▁by ▁the ▁user . ▁A flaw ▁in LibreOffice ▁existed ▁where ▁master ▁key ▁was ▁poorly encode d ▁resulting ▁in ▁weakening ▁its entropy ▁from ▁128 ▁to ▁43 ▁bits ▁making ▁the ▁stored passwords vul er able ▁to ▁a brute ▁force ▁attack ▁if ▁an ▁attacker ▁has ▁access ▁to ▁the ▁users ▁stored config . ▁This ▁issue ▁affects : ▁The Document ▁Foundation LibreOffice ▁7 . 2 ▁versions ▁prior ▁to ▁7 . 2 . 7 ; ▁7 . 3 ▁versions ▁prior ▁to ▁7 . 3 . 3 . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
LibreOffice supports the storage of passwords for web connections in the user’s configuration database. The stored passwords are encrypted with a single master key provided by the user. A flaw in LibreOffice existed where master key was poorly encoded resulting in weakening its entropy from 128 to 43 bits making the stored passwords vulerable to a brute force attack if an attacker has access to the users stored config. This issue affects: The Document Foundation LibreOffice 7.2 versions prior to 7.2.7; 7.3 versions prior to 7.3.3.
SHAP (words)
LibreOffice supports the storage of passwords for web connections in the user’ s configuration database. The stored passwords are encrypted with a single master key provided by the user. A flaw in LibreOffice existed where master key was poorly encoded resulting in weakening its entropy from 128 to 43 bits making the stored passwords vulerable to a brute force attack if an attacker has access to the users stored config. This issue affects: The Document Foundation LibreOffice 7. 2 versions prior to 7. 2. 7; 7. 3 versions prior to 7. 3. 3
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] LibreOffice supports the storage of passwords for web connections in the user’s config u ##ration da tab as ##e . The stored passwords are encrypted with a single master key provided by the user . A flaw in LibreOffice existed where master key was poorly encode d resulting in weakening its entropy from 128 to 43 bits making the stored passwords v ##ule ##rable to a brute force attack if an attacker has access to the users stored config . This issue affects : The Document Foundation LibreOffice 7 . 2 versions prior to 7 . 2 . 7 ; 7 . 3 versions prior to 7 . 3 . 3 . [SEP]
LRP (+Pred, pos-only)
[CLS] LibreOffice supports the storage of passwords for web connections in the user’s config u ##ration da tab as ##e . The stored passwords are encrypted with a single master key provided by the user . A flaw in LibreOffice existed where master key was poorly encode d resulting in weakening its entropy from 128 to 43 bits making the stored passwords v ##ule ##rable to a brute force attack if an attacker has access to the users stored config . This issue affects : The Document Foundation LibreOffice 7 . 2 versions prior to 7 . 2 . 7 ; 7 . 3 versions prior to 7 . 3 . 3 . [SEP]
LIME (words)
LibreOffice supports the storage of passwords for web connections in the user’s configuration database. The stored passwords are encrypted with a single master key provided by the user. A flaw in LibreOffice existed where master key was poorly encoded resulting in weakening its entropy from 128 to 43 bits making the stored passwords vulerable to a brute force attack if an attacker has access to the users stored config. This issue affects: The Document Foundation LibreOffice 7.2 versions prior to 7.2.7; 7.3 versions prior to 7.3.3.
SHAP (words)
LibreOffice supports the storage of passwords for web connections in the user’ s configuration database. The stored passwords are encrypted with a single master key provided by the user. A flaw in LibreOffice existed where master key was poorly encoded resulting in weakening its entropy from 128 to 43 bits making the stored passwords vulerable to a brute force attack if an attacker has access to the users stored config. This issue affects: The Document Foundation LibreOffice 7. 2 versions prior to 7. 2. 7; 7. 3 versions prior to 7. 3. 3
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] LibreOffice supports the storage of passwords for web connections in the user’s config u ##ration da tab as ##e . The stored passwords are encrypted with a single master key provided by the user . A flaw in LibreOffice existed where master key was poorly encode d resulting in weakening its entropy from 128 to 43 bits making the stored passwords v ##ule ##rable to a brute force attack if an attacker has access to the users stored config . This issue affects : The Document Foundation LibreOffice 7 . 2 versions prior to 7 . 2 . 7 ; 7 . 3 versions prior to 7 . 3 . 3 . [SEP]
LRP (+Pred, pos-only)
[CLS] LibreOffice supports the storage of passwords for web connections in the user’s config u ##ration da tab as ##e . The stored passwords are encrypted with a single master key provided by the user . A flaw in LibreOffice existed where master key was poorly encode d resulting in weakening its entropy from 128 to 43 bits making the stored passwords v ##ule ##rable to a brute force attack if an attacker has access to the users stored config . This issue affects : The Document Foundation LibreOffice 7 . 2 versions prior to 7 . 2 . 7 ; 7 . 3 versions prior to 7 . 3 . 3 . [SEP]
LIME (words)
LibreOffice supports the storage of passwords for web connections in the user’s configuration database. The stored passwords are encrypted with a single master key provided by the user. A flaw in LibreOffice existed where master key was poorly encoded resulting in weakening its entropy from 128 to 43 bits making the stored passwords vulerable to a brute force attack if an attacker has access to the users stored config. This issue affects: The Document Foundation LibreOffice 7.2 versions prior to 7.2.7; 7.3 versions prior to 7.3.3.
SHAP (words)
LibreOffice supports the storage of passwords for web connections in the user’ s configuration database. The stored passwords are encrypted with a single master key provided by the user. A flaw in LibreOffice existed where master key was poorly encoded resulting in weakening its entropy from 128 to 43 bits making the stored passwords vulerable to a brute force attack if an attacker has access to the users stored config. This issue affects: The Document Foundation LibreOffice 7. 2 versions prior to 7. 2. 7; 7. 3 versions prior to 7. 3. 3
#65 · cve_id CVE-2024-21627 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
PrestaShop ▁is ▁an open-source e -c o mmer ce ▁platform . ▁Prior ▁to ▁versions ▁8 . 1 . 3 ▁and ▁1 . 7 . 8 . 11 ▁some ▁event ▁attributes ▁are ▁not ▁detected ▁by ▁the ▁` is Cl ean HTML ▁` ▁method . ▁Some ▁modules ▁using ▁the ▁` is Cl ean HTML ▁` ▁method ▁could ▁be ▁vulnerable ▁to cross-site scripting . Versions ▁8 . 1 . 3 ▁and ▁1 . 7 . 8 . 11 ▁contain ▁a ▁patch ▁for ▁this ▁issue . ▁The ▁best workaround ▁is ▁to ▁use ▁the ▁` HTML ▁Pur ifier ` ▁library ▁to sanitize html ▁input ▁coming ▁from ▁users . ▁The ▁library ▁is ▁already ▁available ▁as ▁a dependency ▁in ▁the PrestaShop ▁project . ▁Be ware ▁though ▁that ▁in ▁legacy ▁object ▁models ▁fields ▁of ▁` HTML ▁` ▁type ▁will ▁call ▁` is Cl ean HTML ▁` . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
PrestaShop is an open-source e-commerce platform. Prior to versions 8.1.3 and 1.7.8.11 some event attributes are not detected by the `isCleanHTML` method. Some modules using the `isCleanHTML` method could be vulnerable to cross-site scripting. Versions 8.1.3 and 1.7.8.11 contain a patch for this issue. The best workaround is to use the `HTMLPurifier` library to sanitize html input coming from users. The library is already available as a dependency in the PrestaShop project. Beware though that in legacy object models fields of `HTML` type will call `isCleanHTML`.
SHAP (words)
PrestaShop is an open- source e- commerce platform. Prior to versions 8. 1. 3 and 1. 7. 8. 11 some event attributes are not detected by the ` isCleanHTML` method. Some modules using the ` isCleanHTML` method could be vulnerable to cross- site scripting. Versions 8. 1. 3 and 1. 7. 8. 11 contain a patch for this issue. The best workaround is to use the ` HTMLPurifier` library to sanitize html input coming from users. The library is already available as a dependency in the PrestaShop project. Beware though that in legacy object models fields of ` HTML` type will call ` isCleanHTML
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] PrestaShop is an open-source e -c o ##mmer ##ce platform . Prior to versions 8 . 1 . 3 and 1 . 7 . 8 . 11 some event attributes are not detected by the ` is ##C ##lean HTML ` method . Some mod ul ##es using the ` is ##C ##lean HTML ` method could be vulnerable to cross-site scripting . Versions 8 . 1 . 3 and 1 . 7 . 8 . 11 contain a patch for this issue . The best workaround is to use the ` HTML P uri fi ##er ` library to sanitize html input coming from users . The library is already available as a dependency in the PrestaShop project . Be ##ware though that in legacy object mod el ##s fields of ` HTML ` type will call ` is ##C ##lean HTML ` . [SEP]
LRP (+Pred, pos-only)
[CLS] PrestaShop is an open-source e -c o ##mmer ##ce platform . Prior to versions 8 . 1 . 3 and 1 . 7 . 8 . 11 some event attributes are not detected by the ` is ##C ##lean HTML ` method . Some mod ul ##es using the ` is ##C ##lean HTML ` method could be vulnerable to cross-site scripting . Versions 8 . 1 . 3 and 1 . 7 . 8 . 11 contain a patch for this issue . The best workaround is to use the ` HTML P uri fi ##er ` library to sanitize html input coming from users . The library is already available as a dependency in the PrestaShop project . Be ##ware though that in legacy object mod el ##s fields of ` HTML ` type will call ` is ##C ##lean HTML ` . [SEP]
LIME (words)
PrestaShop is an open-source e-commerce platform. Prior to versions 8.1.3 and 1.7.8.11 some event attributes are not detected by the `isCleanHTML` method. Some modules using the `isCleanHTML` method could be vulnerable to cross-site scripting. Versions 8.1.3 and 1.7.8.11 contain a patch for this issue. The best workaround is to use the `HTMLPurifier` library to sanitize html input coming from users. The library is already available as a dependency in the PrestaShop project. Beware though that in legacy object models fields of `HTML` type will call `isCleanHTML`.
SHAP (words)
PrestaShop is an open- source e- commerce platform. Prior to versions 8. 1. 3 and 1. 7. 8. 11 some event attributes are not detected by the ` isCleanHTML` method. Some modules using the ` isCleanHTML` method could be vulnerable to cross- site scripting. Versions 8. 1. 3 and 1. 7. 8. 11 contain a patch for this issue. The best workaround is to use the ` HTMLPurifier` library to sanitize html input coming from users. The library is already available as a dependency in the PrestaShop project. Beware though that in legacy object models fields of ` HTML` type will call ` isCleanHTML
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] PrestaShop is an open-source e -c o ##mmer ##ce platform . Prior to versions 8 . 1 . 3 and 1 . 7 . 8 . 11 some event attributes are not detected by the ` is ##C ##lean HTML ` method . Some mod ul ##es using the ` is ##C ##lean HTML ` method could be vulnerable to cross-site scripting . Versions 8 . 1 . 3 and 1 . 7 . 8 . 11 contain a patch for this issue . The best workaround is to use the ` HTML P uri fi ##er ` library to sanitize html input coming from users . The library is already available as a dependency in the PrestaShop project . Be ##ware though that in legacy object mod el ##s fields of ` HTML ` type will call ` is ##C ##lean HTML ` . [SEP]
LRP (+Pred, pos-only)
[CLS] PrestaShop is an open-source e -c o ##mmer ##ce platform . Prior to versions 8 . 1 . 3 and 1 . 7 . 8 . 11 some event attributes are not detected by the ` is ##C ##lean HTML ` method . Some mod ul ##es using the ` is ##C ##lean HTML ` method could be vulnerable to cross-site scripting . Versions 8 . 1 . 3 and 1 . 7 . 8 . 11 contain a patch for this issue . The best workaround is to use the ` HTML P uri fi ##er ` library to sanitize html input coming from users . The library is already available as a dependency in the PrestaShop project . Be ##ware though that in legacy object mod el ##s fields of ` HTML ` type will call ` is ##C ##lean HTML ` . [SEP]
LIME (words)
PrestaShop is an open-source e-commerce platform. Prior to versions 8.1.3 and 1.7.8.11 some event attributes are not detected by the `isCleanHTML` method. Some modules using the `isCleanHTML` method could be vulnerable to cross-site scripting. Versions 8.1.3 and 1.7.8.11 contain a patch for this issue. The best workaround is to use the `HTMLPurifier` library to sanitize html input coming from users. The library is already available as a dependency in the PrestaShop project. Beware though that in legacy object models fields of `HTML` type will call `isCleanHTML`.
SHAP (words)
PrestaShop is an open- source e- commerce platform. Prior to versions 8. 1. 3 and 1. 7. 8. 11 some event attributes are not detected by the ` isCleanHTML` method. Some modules using the ` isCleanHTML` method could be vulnerable to cross- site scripting. Versions 8. 1. 3 and 1. 7. 8. 11 contain a patch for this issue. The best workaround is to use the ` HTMLPurifier` library to sanitize html input coming from users. The library is already available as a dependency in the PrestaShop project. Beware though that in legacy object models fields of ` HTML` type will call ` isCleanHTML
#66 · cve_id CVE-2024-0574 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁A ▁vulnerability ▁was ▁found ▁in ▁To to link LR 1200 GB ▁9 . 1 . 0 u . 66 19 _ B 20 2 30 130 ▁and cla ssi fi ed ▁as ▁critical . Affected ▁by ▁this ▁issue ▁is ▁the ▁function ▁set Par ent al Ru les ▁of ▁the ▁file / c gi - bin / c s tec gi . c gi . ▁The ▁manipulation ▁of ▁the ▁argument s Time ▁leads ▁to stack-based ▁buffer overflow . ▁The ▁attack ▁may ▁be ▁launched ▁remotely . ▁The ▁exploit ▁has ▁been disclose d ▁to ▁the ▁public ▁and ▁may ▁be ▁used . ▁V DB - 25 07 90 ▁is ▁the identifier ▁a ssi gne d ▁to ▁this ▁vulnerability . NOT ▁E : ▁The ▁vendor ▁was ▁contacted ▁early ▁about ▁this ▁di sc los ure ▁but ▁did ▁not ▁respond ▁in ▁any ▁way . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
A vulnerability was found in Totolink LR1200GB 9.1.0u.6619_B20230130 and classified as critical. Affected by this issue is the function setParentalRules of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument sTime leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-250790 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
SHAP (words)
A vulnerability was found in Totolink LR1200GB 9. 1. 0u. 6619_B20230130 and classified as critical. Affected by this issue is the function setParentalRules of the file / cgi- bin/ cstecgi. cgi. The manipulation of the argument sTime leads to stack- based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB- 250790 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] A vulnerability was found in To ##to ##link L ##R ##12 ##00 ##GB 9 . 1 . 0 ##u . 66 ##19 _ B ##20 ##23 ##01 ##30 and c ##la ssi fi ##ed as critical . Affected by this issue is the function set ##P ##are ##ntal ##R ##ules of the file / c ##gi - bin / c ##ste ##c ##gi . c ##gi . The man ip ul ##ation of the argument s ##T ##ime leads to stack-based buffer overflow . The attack may be launched remotely . The exploit has been disclose d to the public and may be used . V ##D ##B - 250 ##7 ##90 is the identifier a ssi g ##ned to this vulnerability . NOT E : The vendor was contacted early about this di sc los ##ure but did not respond in any way . [SEP]
LRP (+Pred, pos-only)
[CLS] A vulnerability was found in To ##to ##link L ##R ##12 ##00 ##GB 9 . 1 . 0 ##u . 66 ##19 _ B ##20 ##23 ##01 ##30 and c ##la ssi fi ##ed as critical . Affected by this issue is the function set ##P ##are ##ntal ##R ##ules of the file / c ##gi - bin / c ##ste ##c ##gi . c ##gi . The man ip ul ##ation of the argument s ##T ##ime leads to stack-based buffer overflow . The attack may be launched remotely . The exploit has been disclose d to the public and may be used . V ##D ##B - 250 ##7 ##90 is the identifier a ssi g ##ned to this vulnerability . NOT E : The vendor was contacted early about this di sc los ##ure but did not respond in any way . [SEP]
LIME (words)
A vulnerability was found in Totolink LR1200GB 9.1.0u.6619_B20230130 and classified as critical. Affected by this issue is the function setParentalRules of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument sTime leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-250790 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
SHAP (words)
A vulnerability was found in Totolink LR1200GB 9. 1. 0u. 6619_B20230130 and classified as critical. Affected by this issue is the function setParentalRules of the file / cgi- bin/ cstecgi. cgi. The manipulation of the argument sTime leads to stack- based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB- 250790 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] A vulnerability was found in To ##to ##link L ##R ##12 ##00 ##GB 9 . 1 . 0 ##u . 66 ##19 _ B ##20 ##23 ##01 ##30 and c ##la ssi fi ##ed as critical . Affected by this issue is the function set ##P ##are ##ntal ##R ##ules of the file / c ##gi - bin / c ##ste ##c ##gi . c ##gi . The man ip ul ##ation of the argument s ##T ##ime leads to stack-based buffer overflow . The attack may be launched remotely . The exploit has been disclose d to the public and may be used . V ##D ##B - 250 ##7 ##90 is the identifier a ssi g ##ned to this vulnerability . NOT E : The vendor was contacted early about this di sc los ##ure but did not respond in any way . [SEP]
LRP (+Pred, pos-only)
[CLS] A vulnerability was found in To ##to ##link L ##R ##12 ##00 ##GB 9 . 1 . 0 ##u . 66 ##19 _ B ##20 ##23 ##01 ##30 and c ##la ssi fi ##ed as critical . Affected by this issue is the function set ##P ##are ##ntal ##R ##ules of the file / c ##gi - bin / c ##ste ##c ##gi . c ##gi . The man ip ul ##ation of the argument s ##T ##ime leads to stack-based buffer overflow . The attack may be launched remotely . The exploit has been disclose d to the public and may be used . V ##D ##B - 250 ##7 ##90 is the identifier a ssi g ##ned to this vulnerability . NOT E : The vendor was contacted early about this di sc los ##ure but did not respond in any way . [SEP]
LIME (words)
A vulnerability was found in Totolink LR1200GB 9.1.0u.6619_B20230130 and classified as critical. Affected by this issue is the function setParentalRules of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument sTime leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-250790 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
SHAP (words)
A vulnerability was found in Totolink LR1200GB 9. 1. 0u. 6619_B20230130 and classified as critical. Affected by this issue is the function setParentalRules of the file / cgi- bin/ cstecgi. cgi. The manipulation of the argument sTime leads to stack- based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB- 250790 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way
#67 · cve_id CVE-2023-1990 · av
GT=LOCAL (2)
xlnet · Pred=LOCAL (2) · p=0.99 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁A use-after-free flaw ▁was ▁found ▁in nd l c _ re move ▁in ▁drivers / n f c / st - n ci / nd l c . c ▁in ▁the ▁Linux Kernel . ▁This flaw ▁could ▁allow ▁an ▁attacker ▁to ▁crash ▁the ▁system ▁due ▁to ▁a ▁race ▁problem . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
A use-after-free flaw was found in ndlc_remove in drivers/nfc/st-nci/ndlc.c in the Linux Kernel. This flaw could allow an attacker to crash the system due to a race problem.
SHAP (words)
A use- after- free flaw was found in ndlc_remove in drivers/ nfc/ st- nci/ ndlc. c in the Linux Kernel. This flaw could allow an attacker to crash the system due to a race problem
lrp-bert · Pred=LOCAL (2) · p=0.99 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] A use-after-free flaw was found in n ##dl ##c _ remove in drivers / n ##f ##c / s ##t - n ##ci / n ##dl ##c . c in the Linux Kernel . This flaw could allow an attacker to crash the system due to a race problem . [SEP]
LRP (+Pred, pos-only)
[CLS] A use-after-free flaw was found in n ##dl ##c _ remove in drivers / n ##f ##c / s ##t - n ##ci / n ##dl ##c . c in the Linux Kernel . This flaw could allow an attacker to crash the system due to a race problem . [SEP]
LIME (words)
A use-after-free flaw was found in ndlc_remove in drivers/nfc/st-nci/ndlc.c in the Linux Kernel. This flaw could allow an attacker to crash the system due to a race problem.
SHAP (words)
A use- after- free flaw was found in ndlc_remove in drivers/ nfc/ st- nci/ ndlc. c in the Linux Kernel. This flaw could allow an attacker to crash the system due to a race problem
lrp-distilbert · Pred=LOCAL (2) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] A use-after-free flaw was found in n ##dl ##c _ remove in drivers / n ##f ##c / s ##t - n ##ci / n ##dl ##c . c in the Linux Kernel . This flaw could allow an attacker to crash the system due to a race problem . [SEP]
LRP (+Pred, pos-only)
[CLS] A use-after-free flaw was found in n ##dl ##c _ remove in drivers / n ##f ##c / s ##t - n ##ci / n ##dl ##c . c in the Linux Kernel . This flaw could allow an attacker to crash the system due to a race problem . [SEP]
LIME (words)
A use-after-free flaw was found in ndlc_remove in drivers/nfc/st-nci/ndlc.c in the Linux Kernel. This flaw could allow an attacker to crash the system due to a race problem.
SHAP (words)
A use- after- free flaw was found in ndlc_remove in drivers/ nfc/ st- nci/ ndlc. c in the Linux Kernel. This flaw could allow an attacker to crash the system due to a race problem
#68 · cve_id CVE-2022-21733 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
Tensorflow ▁is ▁an ▁Open ▁Source ▁Machine ▁Learning Frame ▁work . ▁The ▁implementation ▁of ▁` St ring NG ram s ` ▁can ▁be ▁used ▁to ▁trigger ▁a ▁denial ▁of ▁service ▁attack ▁by ▁causing ▁an ▁out ▁of ▁memory ▁condition ▁after ▁an ▁integer overflow . ▁We ▁are ▁mi ssi ng ▁a validation ▁on ▁` pad _ wi t dh ` ▁and ▁that ▁result ▁in ▁computing ▁a ▁negative ▁value ▁for ▁` n gram _ width ` ▁which ▁is ▁later ▁used ▁to allocate ▁parts ▁of ▁the ▁output . ▁The ▁fix ▁will ▁be ▁included ▁in TensorFlow ▁2 . 8 . 0 . ▁We ▁will ▁also ch err y pick ▁this ▁commit ▁on TensorFlow ▁2 . 7 . 1 TensorFlow ▁2 . 6 . 3 ▁and TensorFlow ▁2 . 5 . 3 ▁as ▁these ▁are ▁also ▁affected ▁and ▁still ▁in ▁supported ▁range . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
Tensorflow is an Open Source Machine Learning Framework. The implementation of `StringNGrams` can be used to trigger a denial of service attack by causing an out of memory condition after an integer overflow. We are missing a validation on `pad_witdh` and that result in computing a negative value for `ngram_width` which is later used to allocate parts of the output. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1 TensorFlow 2.6.3 and TensorFlow 2.5.3 as these are also affected and still in supported range.
SHAP (words)
Tensorflow is an Open Source Machine Learning Framework. The implementation of ` StringNGrams` can be used to trigger a denial of service attack by causing an out of memory condition after an integer overflow. We are missing a validation on ` pad_witdh` and that result in computing a negative value for ` ngram_width` which is later used to allocate parts of the output. The fix will be included in TensorFlow 2. 8. 0. We will also cherrypick this commit on TensorFlow 2. 7. 1 TensorFlow 2. 6. 3 and TensorFlow 2. 5. 3 as these are also affected and still in supported range
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Tensorflow is an Open Source Machine Learning Frame work . The implementation of ` String NG ram ##s ` can be used to trigger a denial of service attack by causing an out of memory condition after an int e ##ger overflow . We are mi ssi ng a validation on ` pad _ wit ##dh ` and that result in computing a negative value for ` ng ##ram _ width ` which is later used to allocate parts of the output . The fix will be included in TensorFlow 2 . 8 . 0 . We will also ch err y ##pic ##k this commit on TensorFlow 2 . 7 . 1 TensorFlow 2 . 6 . 3 and TensorFlow 2 . 5 . 3 as these are also affected and still in supported range . [SEP]
LRP (+Pred, pos-only)
[CLS] Tensorflow is an Open Source Machine Learning Frame work . The implementation of ` String NG ram ##s ` can be used to trigger a denial of service attack by causing an out of memory condition after an int e ##ger overflow . We are mi ssi ng a validation on ` pad _ wit ##dh ` and that result in computing a negative value for ` ng ##ram _ width ` which is later used to allocate parts of the output . The fix will be included in TensorFlow 2 . 8 . 0 . We will also ch err y ##pic ##k this commit on TensorFlow 2 . 7 . 1 TensorFlow 2 . 6 . 3 and TensorFlow 2 . 5 . 3 as these are also affected and still in supported range . [SEP]
LIME (words)
Tensorflow is an Open Source Machine Learning Framework. The implementation of `StringNGrams` can be used to trigger a denial of service attack by causing an out of memory condition after an integer overflow. We are missing a validation on `pad_witdh` and that result in computing a negative value for `ngram_width` which is later used to allocate parts of the output. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1 TensorFlow 2.6.3 and TensorFlow 2.5.3 as these are also affected and still in supported range.
SHAP (words)
Tensorflow is an Open Source Machine Learning Framework. The implementation of ` StringNGrams` can be used to trigger a denial of service attack by causing an out of memory condition after an integer overflow. We are missing a validation on ` pad_witdh` and that result in computing a negative value for ` ngram_width` which is later used to allocate parts of the output. The fix will be included in TensorFlow 2. 8. 0. We will also cherrypick this commit on TensorFlow 2. 7. 1 TensorFlow 2. 6. 3 and TensorFlow 2. 5. 3 as these are also affected and still in supported range
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Tensorflow is an Open Source Machine Learning Frame work . The implementation of ` String NG ram ##s ` can be used to trigger a denial of service attack by causing an out of memory condition after an int e ##ger overflow . We are mi ssi ng a validation on ` pad _ wit ##dh ` and that result in computing a negative value for ` ng ##ram _ width ` which is later used to allocate parts of the output . The fix will be included in TensorFlow 2 . 8 . 0 . We will also ch err y ##pic ##k this commit on TensorFlow 2 . 7 . 1 TensorFlow 2 . 6 . 3 and TensorFlow 2 . 5 . 3 as these are also affected and still in supported range . [SEP]
LRP (+Pred, pos-only)
[CLS] Tensorflow is an Open Source Machine Learning Frame work . The implementation of ` String NG ram ##s ` can be used to trigger a denial of service attack by causing an out of memory condition after an int e ##ger overflow . We are mi ssi ng a validation on ` pad _ wit ##dh ` and that result in computing a negative value for ` ng ##ram _ width ` which is later used to allocate parts of the output . The fix will be included in TensorFlow 2 . 8 . 0 . We will also ch err y ##pic ##k this commit on TensorFlow 2 . 7 . 1 TensorFlow 2 . 6 . 3 and TensorFlow 2 . 5 . 3 as these are also affected and still in supported range . [SEP]
LIME (words)
Tensorflow is an Open Source Machine Learning Framework. The implementation of `StringNGrams` can be used to trigger a denial of service attack by causing an out of memory condition after an integer overflow. We are missing a validation on `pad_witdh` and that result in computing a negative value for `ngram_width` which is later used to allocate parts of the output. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1 TensorFlow 2.6.3 and TensorFlow 2.5.3 as these are also affected and still in supported range.
SHAP (words)
Tensorflow is an Open Source Machine Learning Framework. The implementation of ` StringNGrams` can be used to trigger a denial of service attack by causing an out of memory condition after an integer overflow. We are missing a validation on ` pad_witdh` and that result in computing a negative value for ` ngram_width` which is later used to allocate parts of the output. The fix will be included in TensorFlow 2. 8. 0. We will also cherrypick this commit on TensorFlow 2. 7. 1 TensorFlow 2. 6. 3 and TensorFlow 2. 5. 3 as these are also affected and still in supported range
#69 · cve_id CVE-2021-33322 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁In Liferay ▁Portal ▁7 . 3 . 0 ▁and ▁earlier ▁and Liferay DXP ▁7 . 0 ▁before ▁fix ▁pack ▁96 ▁7 . 1 ▁before ▁fix ▁pack ▁18 ▁and ▁7 . 2 ▁before ▁fix ▁pack ▁5 ▁password reset tokens ▁are ▁not invalidated ▁after ▁a ▁user ▁changes ▁their ▁password ▁which ▁allows ▁remote ▁attackers ▁to ▁change ▁the user’s ▁password ▁via ▁the ▁old ▁password reset ▁token . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
In Liferay Portal 7.3.0 and earlier and Liferay DXP 7.0 before fix pack 96 7.1 before fix pack 18 and 7.2 before fix pack 5 password reset tokens are not invalidated after a user changes their password which allows remote attackers to change the user’s password via the old password reset token.
SHAP (words)
In Liferay Portal 7. 3. 0 and earlier and Liferay DXP 7. 0 before fix pack 96 7. 1 before fix pack 18 and 7. 2 before fix pack 5 password reset tokens are not invalidated after a user changes their password which allows remote attackers to change the user’ s password via the old password reset token
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] In Liferay Portal 7 . 3 . 0 and earlier and Liferay DXP 7 . 0 before fix pack 96 7 . 1 before fix pack 18 and 7 . 2 before fix pack 5 password reset tokens are not invalidated after a user changes their password which allows remote attackers to change the user’s password via the old password reset token . [SEP]
LRP (+Pred, pos-only)
[CLS] In Liferay Portal 7 . 3 . 0 and earlier and Liferay DXP 7 . 0 before fix pack 96 7 . 1 before fix pack 18 and 7 . 2 before fix pack 5 password reset tokens are not invalidated after a user changes their password which allows remote attackers to change the user’s password via the old password reset token . [SEP]
LIME (words)
In Liferay Portal 7.3.0 and earlier and Liferay DXP 7.0 before fix pack 96 7.1 before fix pack 18 and 7.2 before fix pack 5 password reset tokens are not invalidated after a user changes their password which allows remote attackers to change the user’s password via the old password reset token.
SHAP (words)
In Liferay Portal 7. 3. 0 and earlier and Liferay DXP 7. 0 before fix pack 96 7. 1 before fix pack 18 and 7. 2 before fix pack 5 password reset tokens are not invalidated after a user changes their password which allows remote attackers to change the user’ s password via the old password reset token
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] In Liferay Portal 7 . 3 . 0 and earlier and Liferay DXP 7 . 0 before fix pack 96 7 . 1 before fix pack 18 and 7 . 2 before fix pack 5 password reset tokens are not invalidated after a user changes their password which allows remote attackers to change the user’s password via the old password reset token . [SEP]
LRP (+Pred, pos-only)
[CLS] In Liferay Portal 7 . 3 . 0 and earlier and Liferay DXP 7 . 0 before fix pack 96 7 . 1 before fix pack 18 and 7 . 2 before fix pack 5 password reset tokens are not invalidated after a user changes their password which allows remote attackers to change the user’s password via the old password reset token . [SEP]
LIME (words)
In Liferay Portal 7.3.0 and earlier and Liferay DXP 7.0 before fix pack 96 7.1 before fix pack 18 and 7.2 before fix pack 5 password reset tokens are not invalidated after a user changes their password which allows remote attackers to change the user’s password via the old password reset token.
SHAP (words)
In Liferay Portal 7. 3. 0 and earlier and Liferay DXP 7. 0 before fix pack 96 7. 1 before fix pack 18 and 7. 2 before fix pack 5 password reset tokens are not invalidated after a user changes their password which allows remote attackers to change the user’ s password via the old password reset token
#70 · cve_id CVE-2020-7070 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁In PHP ▁versions ▁7 . 2 . x ▁below ▁7 . 2 . 34 ▁7 . 3 . x ▁below ▁7 . 3 . 23 ▁and ▁7 . 4 . x ▁below ▁7 . 4 . 11 ▁when PHP ▁is ▁pro ce ssi ng ▁incoming HTTP ▁cookie ▁values ▁the ▁cookie ▁names ▁are url - decoded . ▁This ▁may ▁lead ▁to ▁cookies ▁with ▁pre fixes ▁like ▁_ _ Ho st confuse d ▁with ▁cookies ▁that decode ▁to ▁such ▁prefix ▁thus ▁leading ▁to ▁an ▁attacker ▁being ▁able ▁to ▁for ge ▁cookie ▁which ▁is ▁supposed ▁to ▁be ▁secure . ▁See ▁also CVE - 20 20 - 81 84 ▁for ▁more ▁in for matio n . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
In PHP versions 7.2.x below 7.2.34 7.3.x below 7.3.23 and 7.4.x below 7.4.11 when PHP is processing incoming HTTP cookie values the cookie names are url-decoded. This may lead to cookies with prefixes like __Host confused with cookies that decode to such prefix thus leading to an attacker being able to forge cookie which is supposed to be secure. See also CVE-2020-8184 for more information.
SHAP (words)
In PHP versions 7. 2. x below 7. 2. 34 7. 3. x below 7. 3. 23 and 7. 4. x below 7. 4. 11 when PHP is processing incoming HTTP cookie values the cookie names are url- decoded. This may lead to cookies with prefixes like __Host confused with cookies that decode to such prefix thus leading to an attacker being able to forge cookie which is supposed to be secure. See also CVE- 2020- 8184 for more information
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] In PHP versions 7 . 2 . x below 7 . 2 . 34 7 . 3 . x below 7 . 3 . 23 and 7 . 4 . x below 7 . 4 . 11 when PHP is pro ##ce ssi ng incoming HTTP cookie values the cookie names are url - decoded . This may lead to cookies with pre fixes like _ _ Host confuse d with cookies that decode to such prefix thus leading to an attacker being able to forge cookie which is supposed to be secure . See also CVE - 2020 - 81 ##8 ##4 for more info ##r matio n . [SEP]
LRP (+Pred, pos-only)
[CLS] In PHP versions 7 . 2 . x below 7 . 2 . 34 7 . 3 . x below 7 . 3 . 23 and 7 . 4 . x below 7 . 4 . 11 when PHP is pro ##ce ssi ng incoming HTTP cookie values the cookie names are url - decoded . This may lead to cookies with pre fixes like _ _ Host confuse d with cookies that decode to such prefix thus leading to an attacker being able to forge cookie which is supposed to be secure . See also CVE - 2020 - 81 ##8 ##4 for more info ##r matio n . [SEP]
LIME (words)
In PHP versions 7.2.x below 7.2.34 7.3.x below 7.3.23 and 7.4.x below 7.4.11 when PHP is processing incoming HTTP cookie values the cookie names are url-decoded. This may lead to cookies with prefixes like __Host confused with cookies that decode to such prefix thus leading to an attacker being able to forge cookie which is supposed to be secure. See also CVE-2020-8184 for more information.
SHAP (words)
In PHP versions 7. 2. x below 7. 2. 34 7. 3. x below 7. 3. 23 and 7. 4. x below 7. 4. 11 when PHP is processing incoming HTTP cookie values the cookie names are url- decoded. This may lead to cookies with prefixes like __Host confused with cookies that decode to such prefix thus leading to an attacker being able to forge cookie which is supposed to be secure. See also CVE- 2020- 8184 for more information
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] In PHP versions 7 . 2 . x below 7 . 2 . 34 7 . 3 . x below 7 . 3 . 23 and 7 . 4 . x below 7 . 4 . 11 when PHP is pro ##ce ssi ng incoming HTTP cookie values the cookie names are url - decoded . This may lead to cookies with pre fixes like _ _ Host confuse d with cookies that decode to such prefix thus leading to an attacker being able to forge cookie which is supposed to be secure . See also CVE - 2020 - 81 ##8 ##4 for more info ##r matio n . [SEP]
LRP (+Pred, pos-only)
[CLS] In PHP versions 7 . 2 . x below 7 . 2 . 34 7 . 3 . x below 7 . 3 . 23 and 7 . 4 . x below 7 . 4 . 11 when PHP is pro ##ce ssi ng incoming HTTP cookie values the cookie names are url - decoded . This may lead to cookies with pre fixes like _ _ Host confuse d with cookies that decode to such prefix thus leading to an attacker being able to forge cookie which is supposed to be secure . See also CVE - 2020 - 81 ##8 ##4 for more info ##r matio n . [SEP]
LIME (words)
In PHP versions 7.2.x below 7.2.34 7.3.x below 7.3.23 and 7.4.x below 7.4.11 when PHP is processing incoming HTTP cookie values the cookie names are url-decoded. This may lead to cookies with prefixes like __Host confused with cookies that decode to such prefix thus leading to an attacker being able to forge cookie which is supposed to be secure. See also CVE-2020-8184 for more information.
SHAP (words)
In PHP versions 7. 2. x below 7. 2. 34 7. 3. x below 7. 3. 23 and 7. 4. x below 7. 4. 11 when PHP is processing incoming HTTP cookie values the cookie names are url- decoded. This may lead to cookies with prefixes like __Host confused with cookies that decode to such prefix thus leading to an attacker being able to forge cookie which is supposed to be secure. See also CVE- 2020- 8184 for more information
#71 · cve_id CVE-2023-25590 · av
GT=LOCAL (2)
xlnet · Pred=LOCAL (2) · p=0.99 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁A ▁vulnerability ▁in ▁the ClearPass ▁On Guard ▁Linux ▁agent ▁could ▁allow malicious ▁users ▁on ▁a ▁Linux ▁instance ▁to elevate ▁their ▁user ▁privileges ▁to ▁those ▁of ▁a ▁higher ▁role . ▁A ▁successful ▁exploit ▁allows malicious ▁users ▁to ▁execute ▁arbitrary ▁code ▁with ▁root ▁level ▁privileges ▁on ▁the ▁Linux ▁instance . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
A vulnerability in the ClearPass OnGuard Linux agent could allow malicious users on a Linux instance to elevate their user privileges to those of a higher role. A successful exploit allows malicious users to execute arbitrary code with root level privileges on the Linux instance.
SHAP (words)
A vulnerability in the ClearPass OnGuard Linux agent could allow malicious users on a Linux instance to elevate their user privileges to those of a higher role. A successful exploit allows malicious users to execute arbitrary code with root level privileges on the Linux instance
lrp-bert · Pred=LOCAL (2) · p=0.99 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] A vulnerability in the ClearPass On ##G ##uard Linux agent could allow malicious users on a Linux instance to elevate their user privileges to those of a higher role . A successful exploit allows malicious users to exec u ##te arbitrary code with root level privileges on the Linux instance . [SEP]
LRP (+Pred, pos-only)
[CLS] A vulnerability in the ClearPass On ##G ##uard Linux agent could allow malicious users on a Linux instance to elevate their user privileges to those of a higher role . A successful exploit allows malicious users to exec u ##te arbitrary code with root level privileges on the Linux instance . [SEP]
LIME (words)
A vulnerability in the ClearPass OnGuard Linux agent could allow malicious users on a Linux instance to elevate their user privileges to those of a higher role. A successful exploit allows malicious users to execute arbitrary code with root level privileges on the Linux instance.
SHAP (words)
A vulnerability in the ClearPass OnGuard Linux agent could allow malicious users on a Linux instance to elevate their user privileges to those of a higher role. A successful exploit allows malicious users to execute arbitrary code with root level privileges on the Linux instance
lrp-distilbert · Pred=LOCAL (2) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] A vulnerability in the ClearPass On ##G ##uard Linux agent could allow malicious users on a Linux instance to elevate their user privileges to those of a higher role . A successful exploit allows malicious users to exec u ##te arbitrary code with root level privileges on the Linux instance . [SEP]
LRP (+Pred, pos-only)
[CLS] A vulnerability in the ClearPass On ##G ##uard Linux agent could allow malicious users on a Linux instance to elevate their user privileges to those of a higher role . A successful exploit allows malicious users to exec u ##te arbitrary code with root level privileges on the Linux instance . [SEP]
LIME (words)
A vulnerability in the ClearPass OnGuard Linux agent could allow malicious users on a Linux instance to elevate their user privileges to those of a higher role. A successful exploit allows malicious users to execute arbitrary code with root level privileges on the Linux instance.
SHAP (words)
A vulnerability in the ClearPass OnGuard Linux agent could allow malicious users on a Linux instance to elevate their user privileges to those of a higher role. A successful exploit allows malicious users to execute arbitrary code with root level privileges on the Linux instance
#72 · cve_id CVE-2020-13485 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁The ▁K nock ▁K nock plugin ▁before ▁1 . 2 . 8 ▁for Craft CMS ▁allows ▁IP ▁White list ▁bypass ▁via ▁an X-Forwarded-For HTTP ▁header . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
The Knock Knock plugin before 1.2.8 for Craft CMS allows IP Whitelist bypass via an X-Forwarded-For HTTP header.
SHAP (words)
The Knock Knock plugin before 1. 2. 8 for Craft CMS allows IP Whitelist bypass via an X- Forwarded- For HTTP header
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] The K ##nock K ##nock plugin before 1 . 2 . 8 for Craft CMS allows IP W ##h ite list bypass via an X-Forwarded-For HTTP header . [SEP]
LRP (+Pred, pos-only)
[CLS] The K ##nock K ##nock plugin before 1 . 2 . 8 for Craft CMS allows IP W ##h ite list bypass via an X-Forwarded-For HTTP header . [SEP]
LIME (words)
The Knock Knock plugin before 1.2.8 for Craft CMS allows IP Whitelist bypass via an X-Forwarded-For HTTP header.
SHAP (words)
The Knock Knock plugin before 1. 2. 8 for Craft CMS allows IP Whitelist bypass via an X- Forwarded- For HTTP header
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] The K ##nock K ##nock plugin before 1 . 2 . 8 for Craft CMS allows IP W ##h ite list bypass via an X-Forwarded-For HTTP header . [SEP]
LRP (+Pred, pos-only)
[CLS] The K ##nock K ##nock plugin before 1 . 2 . 8 for Craft CMS allows IP W ##h ite list bypass via an X-Forwarded-For HTTP header . [SEP]
LIME (words)
The Knock Knock plugin before 1.2.8 for Craft CMS allows IP Whitelist bypass via an X-Forwarded-For HTTP header.
SHAP (words)
The Knock Knock plugin before 1. 2. 8 for Craft CMS allows IP Whitelist bypass via an X- Forwarded- For HTTP header
#73 · cve_id CVE-2022-45931 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁A SQL inject ion ▁issue ▁was ▁di sc ▁over ed ▁in ▁A AA ▁in OpenDaylight ( OD L ) ▁before ▁0 . 16 . 5 . ▁The ▁a a a - id m - store - h 2/ src / main / java / org / open day light / a a a / data store / h 2/ User ▁Store . java delete User ▁function ▁is ▁affected ▁when ▁the ▁API ▁interface / auth / v 1/ user s / ▁is ▁used . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
A SQL injection issue was discovered in AAA in OpenDaylight (ODL) before 0.16.5. The aaa-idm-store-h2/src/main/java/org/opendaylight/aaa/datastore/h2/UserStore.java deleteUser function is affected when the API interface /auth/v1/users/ is used.
SHAP (words)
A SQL injection issue was discovered in AAA in OpenDaylight ( ODL) before 0. 16. 5. The aaa- idm- store- h2/ src/ main/ java/ org/ opendaylight/ aaa/ datastore/ h2/ UserStore. java deleteUser function is affected when the API interface / auth/ v1/ users/ is used
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] A SQL inject ion issue was di sc over ##ed in AAA in OpenDaylight ( O ##D ##L ) before 0 . 16 . 5 . The a ##aa - id ##m - store - h ##2 / src / main / java / org / open ##day ##light / a ##aa / data ##sto ##re / h ##2 / User Store . java delete User function is affected when the A PI int er ##face / auth / v ##1 / users / is used . [SEP]
LRP (+Pred, pos-only)
[CLS] A SQL inject ion issue was di sc over ##ed in AAA in OpenDaylight ( O ##D ##L ) before 0 . 16 . 5 . The a ##aa - id ##m - store - h ##2 / src / main / java / org / open ##day ##light / a ##aa / data ##sto ##re / h ##2 / User Store . java delete User function is affected when the A PI int er ##face / auth / v ##1 / users / is used . [SEP]
LIME (words)
A SQL injection issue was discovered in AAA in OpenDaylight (ODL) before 0.16.5. The aaa-idm-store-h2/src/main/java/org/opendaylight/aaa/datastore/h2/UserStore.java deleteUser function is affected when the API interface /auth/v1/users/ is used.
SHAP (words)
A SQL injection issue was discovered in AAA in OpenDaylight ( ODL) before 0. 16. 5. The aaa- idm- store- h2/ src/ main/ java/ org/ opendaylight/ aaa/ datastore/ h2/ UserStore. java deleteUser function is affected when the API interface / auth/ v1/ users/ is used
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] A SQL inject ion issue was di sc over ##ed in AAA in OpenDaylight ( O ##D ##L ) before 0 . 16 . 5 . The a ##aa - id ##m - store - h ##2 / src / main / java / org / open ##day ##light / a ##aa / data ##sto ##re / h ##2 / User Store . java delete User function is affected when the A PI int er ##face / auth / v ##1 / users / is used . [SEP]
LRP (+Pred, pos-only)
[CLS] A SQL inject ion issue was di sc over ##ed in AAA in OpenDaylight ( O ##D ##L ) before 0 . 16 . 5 . The a ##aa - id ##m - store - h ##2 / src / main / java / org / open ##day ##light / a ##aa / data ##sto ##re / h ##2 / User Store . java delete User function is affected when the A PI int er ##face / auth / v ##1 / users / is used . [SEP]
LIME (words)
A SQL injection issue was discovered in AAA in OpenDaylight (ODL) before 0.16.5. The aaa-idm-store-h2/src/main/java/org/opendaylight/aaa/datastore/h2/UserStore.java deleteUser function is affected when the API interface /auth/v1/users/ is used.
SHAP (words)
A SQL injection issue was discovered in AAA in OpenDaylight ( ODL) before 0. 16. 5. The aaa- idm- store- h2/ src/ main/ java/ org/ opendaylight/ aaa/ datastore/ h2/ UserStore. java deleteUser function is affected when the API interface / auth/ v1/ users/ is used
#74 · cve_id CVE-2021-3447 · av
GT=LOCAL (2)
xlnet · Pred=LOCAL (2) · p=0.95 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁A flaw ▁was ▁found ▁in ▁several ansible ▁modules ▁where param eter s ▁containing credential s ▁such ▁as ▁secrets ▁were ▁being ▁logged ▁in plain-text ▁on ▁managed ▁nodes ▁as ▁well ▁as ▁being ▁made ▁visible ▁on ▁the ▁controller ▁node ▁when ▁run ▁in verbose ▁mode . ▁These param eter s ▁were ▁not ▁protected ▁by ▁the ▁no _ log ▁feature . ▁An ▁attacker ▁can ▁take ▁advantage ▁of ▁this ▁in for matio n ▁to ▁steal ▁those credential s ▁provided ▁when ▁they ▁have ▁access ▁to ▁the ▁log ▁files ▁containing ▁them . ▁The ▁highest ▁threat ▁from ▁this ▁vulnerability ▁is ▁to ▁data confidentiality . ▁This flaw ▁affects ▁Red ▁Hat Ansible Automation Plat ▁form ▁in ▁versions ▁before ▁1 . 2 . 2 ▁and Ansible ▁Tower ▁in ▁versions ▁before ▁3 . 8 . 2 . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
A flaw was found in several ansible modules where parameters containing credentials such as secrets were being logged in plain-text on managed nodes as well as being made visible on the controller node when run in verbose mode. These parameters were not protected by the no_log feature. An attacker can take advantage of this information to steal those credentials provided when they have access to the log files containing them. The highest threat from this vulnerability is to data confidentiality. This flaw affects Red Hat Ansible Automation Platform in versions before 1.2.2 and Ansible Tower in versions before 3.8.2.
SHAP (words)
A flaw was found in several ansible modules where parameters containing credentials such as secrets were being logged in plain- text on managed nodes as well as being made visible on the controller node when run in verbose mode. These parameters were not protected by the no_log feature. An attacker can take advantage of this information to steal those credentials provided when they have access to the log files containing them. The highest threat from this vulnerability is to data confidentiality. This flaw affects Red Hat Ansible Automation Platform in versions before 1. 2. 2 and Ansible Tower in versions before 3. 8. 2
lrp-bert · Pred=LOCAL (2) · p=0.97 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] A flaw was found in several ansible mod ul ##es where param et ##ers containing credential s such as secrets were being logged in plain-text on managed nodes as well as being made visible on the controller node when run in verbose mod e . These param et ##ers were not protected by the no _ log feature . An attacker can take advantage of this info ##r matio n to steal those credential s provided when they have access to the log files containing them . The highest threat from this vulnerability is to data confidentiality . This flaw affects Red Hat Ansible Automation Plat form in versions before 1 . 2 . 2 and Ansible Tower in versions before 3 . 8 . 2 . [SEP]
LRP (+Pred, pos-only)
[CLS] A flaw was found in several ansible mod ul ##es where param et ##ers containing credential s such as secrets were being logged in plain-text on managed nodes as well as being made visible on the controller node when run in verbose mod e . These param et ##ers were not protected by the no _ log feature . An attacker can take advantage of this info ##r matio n to steal those credential s provided when they have access to the log files containing them . The highest threat from this vulnerability is to data confidentiality . This flaw affects Red Hat Ansible Automation Plat form in versions before 1 . 2 . 2 and Ansible Tower in versions before 3 . 8 . 2 . [SEP]
LIME (words)
A flaw was found in several ansible modules where parameters containing credentials such as secrets were being logged in plain-text on managed nodes as well as being made visible on the controller node when run in verbose mode. These parameters were not protected by the no_log feature. An attacker can take advantage of this information to steal those credentials provided when they have access to the log files containing them. The highest threat from this vulnerability is to data confidentiality. This flaw affects Red Hat Ansible Automation Platform in versions before 1.2.2 and Ansible Tower in versions before 3.8.2.
SHAP (words)
A flaw was found in several ansible modules where parameters containing credentials such as secrets were being logged in plain- text on managed nodes as well as being made visible on the controller node when run in verbose mode. These parameters were not protected by the no_log feature. An attacker can take advantage of this information to steal those credentials provided when they have access to the log files containing them. The highest threat from this vulnerability is to data confidentiality. This flaw affects Red Hat Ansible Automation Platform in versions before 1. 2. 2 and Ansible Tower in versions before 3. 8. 2
lrp-distilbert · Pred=LOCAL (2) · p=0.99 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] A flaw was found in several ansible mod ul ##es where param et ##ers containing credential s such as secrets were being logged in plain-text on managed nodes as well as being made visible on the controller node when run in verbose mod e . These param et ##ers were not protected by the no _ log feature . An attacker can take advantage of this info ##r matio n to steal those credential s provided when they have access to the log files containing them . The highest threat from this vulnerability is to data confidentiality . This flaw affects Red Hat Ansible Automation Plat form in versions before 1 . 2 . 2 and Ansible Tower in versions before 3 . 8 . 2 . [SEP]
LRP (+Pred, pos-only)
[CLS] A flaw was found in several ansible mod ul ##es where param et ##ers containing credential s such as secrets were being logged in plain-text on managed nodes as well as being made visible on the controller node when run in verbose mod e . These param et ##ers were not protected by the no _ log feature . An attacker can take advantage of this info ##r matio n to steal those credential s provided when they have access to the log files containing them . The highest threat from this vulnerability is to data confidentiality . This flaw affects Red Hat Ansible Automation Plat form in versions before 1 . 2 . 2 and Ansible Tower in versions before 3 . 8 . 2 . [SEP]
LIME (words)
A flaw was found in several ansible modules where parameters containing credentials such as secrets were being logged in plain-text on managed nodes as well as being made visible on the controller node when run in verbose mode. These parameters were not protected by the no_log feature. An attacker can take advantage of this information to steal those credentials provided when they have access to the log files containing them. The highest threat from this vulnerability is to data confidentiality. This flaw affects Red Hat Ansible Automation Platform in versions before 1.2.2 and Ansible Tower in versions before 3.8.2.
SHAP (words)
A flaw was found in several ansible modules where parameters containing credentials such as secrets were being logged in plain- text on managed nodes as well as being made visible on the controller node when run in verbose mode. These parameters were not protected by the no_log feature. An attacker can take advantage of this information to steal those credentials provided when they have access to the log files containing them. The highest threat from this vulnerability is to data confidentiality. This flaw affects Red Hat Ansible Automation Platform in versions before 1. 2. 2 and Ansible Tower in versions before 3. 8. 2
#75 · cve_id CVE-2022-44429 · av
GT=LOCAL (2)
xlnet · Pred=LOCAL (2) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁In wlan ▁driver ▁there ▁is ▁a ▁po ssi ble ▁mi ssi ng ▁bound s ▁check . ▁This ▁could ▁lead ▁to ▁local ▁denial ▁of ▁service ▁in wlan ▁services . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
In wlan driver there is a possible missing bounds check. This could lead to local denial of service in wlan services.
SHAP (words)
In wlan driver there is a possible missing bounds check. This could lead to local denial of service in wlan services
lrp-bert · Pred=LOCAL (2) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] In wlan driver there is a p ##o ssi b ##le mi ssi ng bounds check . This could lead to local denial of service in wlan services . [SEP]
LRP (+Pred, pos-only)
[CLS] In wlan driver there is a p ##o ssi b ##le mi ssi ng bounds check . This could lead to local denial of service in wlan services . [SEP]
LIME (words)
In wlan driver there is a possible missing bounds check. This could lead to local denial of service in wlan services.
SHAP (words)
In wlan driver there is a possible missing bounds check. This could lead to local denial of service in wlan services
lrp-distilbert · Pred=LOCAL (2) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] In wlan driver there is a p ##o ssi b ##le mi ssi ng bounds check . This could lead to local denial of service in wlan services . [SEP]
LRP (+Pred, pos-only)
[CLS] In wlan driver there is a p ##o ssi b ##le mi ssi ng bounds check . This could lead to local denial of service in wlan services . [SEP]
LIME (words)
In wlan driver there is a possible missing bounds check. This could lead to local denial of service in wlan services.
SHAP (words)
In wlan driver there is a possible missing bounds check. This could lead to local denial of service in wlan services
#76 · cve_id CVE-2022-28133 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁Jenkins Bitbucket ▁Server ▁Integration Plugin ▁3 . 1 . 0 ▁and ▁earlier ▁does ▁not ▁limit URL sc ▁he mes ▁for callback URLs ▁on OAuth ▁consumers ▁resulting ▁in ▁a ▁stored cross-site scripting ( XSS ) ▁vulnerability exploitable ▁by ▁attackers ▁able ▁to ▁create ▁Bit B uck et ▁Server ▁consumers . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
Jenkins Bitbucket Server Integration Plugin 3.1.0 and earlier does not limit URL schemes for callback URLs on OAuth consumers resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create BitBucket Server consumers.
SHAP (words)
Jenkins Bitbucket Server Integration Plugin 3. 1. 0 and earlier does not limit URL schemes for callback URLs on OAuth consumers resulting in a stored cross- site scripting ( XSS) vulnerability exploitable by attackers able to create BitBucket Server consumers
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Jenkins Bitbucket Server Integration Plugin 3 . 1 . 0 and earlier does not limit URL sc hem ##es for callback URLs on OAuth consumers resulting in a stored cross-site scripting ( XSS ) vulnerability exploitable by attackers able to create Bit ##B ##uck ##et Server consumers . [SEP]
LRP (+Pred, pos-only)
[CLS] Jenkins Bitbucket Server Integration Plugin 3 . 1 . 0 and earlier does not limit URL sc hem ##es for callback URLs on OAuth consumers resulting in a stored cross-site scripting ( XSS ) vulnerability exploitable by attackers able to create Bit ##B ##uck ##et Server consumers . [SEP]
LIME (words)
Jenkins Bitbucket Server Integration Plugin 3.1.0 and earlier does not limit URL schemes for callback URLs on OAuth consumers resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create BitBucket Server consumers.
SHAP (words)
Jenkins Bitbucket Server Integration Plugin 3. 1. 0 and earlier does not limit URL schemes for callback URLs on OAuth consumers resulting in a stored cross- site scripting ( XSS) vulnerability exploitable by attackers able to create BitBucket Server consumers
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] Jenkins Bitbucket Server Integration Plugin 3 . 1 . 0 and earlier does not limit URL sc hem ##es for callback URLs on OAuth consumers resulting in a stored cross-site scripting ( XSS ) vulnerability exploitable by attackers able to create Bit ##B ##uck ##et Server consumers . [SEP]
LRP (+Pred, pos-only)
[CLS] Jenkins Bitbucket Server Integration Plugin 3 . 1 . 0 and earlier does not limit URL sc hem ##es for callback URLs on OAuth consumers resulting in a stored cross-site scripting ( XSS ) vulnerability exploitable by attackers able to create Bit ##B ##uck ##et Server consumers . [SEP]
LIME (words)
Jenkins Bitbucket Server Integration Plugin 3.1.0 and earlier does not limit URL schemes for callback URLs on OAuth consumers resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create BitBucket Server consumers.
SHAP (words)
Jenkins Bitbucket Server Integration Plugin 3. 1. 0 and earlier does not limit URL schemes for callback URLs on OAuth consumers resulting in a stored cross- site scripting ( XSS) vulnerability exploitable by attackers able to create BitBucket Server consumers
#77 · cve_id CVE-2020-23349 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=0.99 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁An ▁intent redirection ▁issue ▁was ▁do sc ▁over ed ▁in ▁Sin a ▁Wei bo ▁Android SDK ▁4 . 2 . 7 ( com . s ina . wei bo . s d k . share . W b Share ▁Trans Activity ) ▁any ▁un ex port ed ▁Activities ▁could ▁be ▁started ▁by ▁the ▁com . s ina . wei bo . s d k . share . W b Share ▁Trans Activity . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
An intent redirection issue was doscovered in Sina Weibo Android SDK 4.2.7 (com.sina.weibo.sdk.share.WbShareTransActivity) any unexported Activities could be started by the com.sina.weibo.sdk.share.WbShareTransActivity.
SHAP (words)
An intent redirection issue was doscovered in Sina Weibo Android SDK 4. 2. 7 ( com. sina. weibo. sdk. share. WbShareTransActivity) any unexported Activities could be started by the com. sina. weibo. sdk. share. WbShareTransActivity
lrp-bert · Pred=NETWORK (0) · p=0.99 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] An int en ##t redirection issue was do sc over ##ed in Sin ##a Wei ##bo Android SDK 4 . 2 . 7 ( com . sin ##a . we ##ib ##o . s ##d ##k . share . W ##b Share Trans Activity ) any une ##x ##port ##ed Activities could be s tar te ##d by the com . sin ##a . we ##ib ##o . s ##d ##k . share . W ##b Share Trans Activity . [SEP]
LRP (+Pred, pos-only)
[CLS] An int en ##t redirection issue was do sc over ##ed in Sin ##a Wei ##bo Android SDK 4 . 2 . 7 ( com . sin ##a . we ##ib ##o . s ##d ##k . share . W ##b Share Trans Activity ) any une ##x ##port ##ed Activities could be s tar te ##d by the com . sin ##a . we ##ib ##o . s ##d ##k . share . W ##b Share Trans Activity . [SEP]
LIME (words)
An intent redirection issue was doscovered in Sina Weibo Android SDK 4.2.7 (com.sina.weibo.sdk.share.WbShareTransActivity) any unexported Activities could be started by the com.sina.weibo.sdk.share.WbShareTransActivity.
SHAP (words)
An intent redirection issue was doscovered in Sina Weibo Android SDK 4. 2. 7 ( com. sina. weibo. sdk. share. WbShareTransActivity) any unexported Activities could be started by the com. sina. weibo. sdk. share. WbShareTransActivity
lrp-distilbert · Pred=NETWORK (0) · p=0.95 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] An int en ##t redirection issue was do sc over ##ed in Sin ##a Wei ##bo Android SDK 4 . 2 . 7 ( com . sin ##a . we ##ib ##o . s ##d ##k . share . W ##b Share Trans Activity ) any une ##x ##port ##ed Activities could be s tar te ##d by the com . sin ##a . we ##ib ##o . s ##d ##k . share . W ##b Share Trans Activity . [SEP]
LRP (+Pred, pos-only)
[CLS] An int en ##t redirection issue was do sc over ##ed in Sin ##a Wei ##bo Android SDK 4 . 2 . 7 ( com . sin ##a . we ##ib ##o . s ##d ##k . share . W ##b Share Trans Activity ) any une ##x ##port ##ed Activities could be s tar te ##d by the com . sin ##a . we ##ib ##o . s ##d ##k . share . W ##b Share Trans Activity . [SEP]
LIME (words)
An intent redirection issue was doscovered in Sina Weibo Android SDK 4.2.7 (com.sina.weibo.sdk.share.WbShareTransActivity) any unexported Activities could be started by the com.sina.weibo.sdk.share.WbShareTransActivity.
SHAP (words)
An intent redirection issue was doscovered in Sina Weibo Android SDK 4. 2. 7 ( com. sina. weibo. sdk. share. WbShareTransActivity) any unexported Activities could be started by the com. sina. weibo. sdk. share. WbShareTransActivity
#78 · cve_id CVE-2023-5389 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=0.99 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁An ▁attacker ▁could ▁potentially ▁exploit ▁this ▁vulnerability ▁leading ▁to ▁the ▁ability ▁to ▁modify ▁files ▁on Honeywell Experion ▁Control Ed ge ▁Virtual U OC ▁and ▁Control Ed ge ▁U OC . ▁This ▁exploit ▁could ▁be ▁used ▁to ▁write ▁a ▁file ▁that ▁may ▁result ▁in ▁unexpected ▁behavior ▁based ▁on ▁configuration ▁changes ▁or updating ▁of ▁files ▁that ▁could ▁result ▁in ▁subsequent ▁execution ▁of ▁a malicious ▁application ▁if ▁triggered . Honeywell recommends updating ▁to ▁the ▁most ▁recent ▁version ▁of ▁the ▁product . ▁See Honeywell ▁Security Notification ▁for ▁recommendations ▁on upgrading ▁and ▁version ing . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
An attacker could potentially exploit this vulnerability leading to the ability to modify files on Honeywell Experion ControlEdge VirtualUOC and ControlEdge UOC . This exploit could be used to write a file that may result in unexpected behavior based on configuration changes or updating of files that could result in subsequent execution of a malicious application if triggered. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning.
SHAP (words)
An attacker could potentially exploit this vulnerability leading to the ability to modify files on Honeywell Experion ControlEdge VirtualUOC and ControlEdge UOC . This exploit could be used to write a file that may result in unexpected behavior based on configuration changes or updating of files that could result in subsequent execution of a malicious application if triggered. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning
lrp-bert · Pred=NETWORK (0) · p=0.99 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] An attacker could potentially exploit this vulnerability leading to the ability to mod if ##y files on Honeywell Experion Control ##E ##dge Virtual ##U ##OC and Control ##E ##dge U ##OC . This exploit could be used to w ##r ite a file that may result in unexpected behavior based on config u ##ration changes or updating of files that could result in subsequent exec u ##tion of a malicious application if triggered . Honeywell recommends updating to the most recent version of the product . See Honeywell Se ##c uri t ##y Notification for recommendations on upgrading and version ##ing . [SEP]
LRP (+Pred, pos-only)
[CLS] An attacker could potentially exploit this vulnerability leading to the ability to mod if ##y files on Honeywell Experion Control ##E ##dge Virtual ##U ##OC and Control ##E ##dge U ##OC . This exploit could be used to w ##r ite a file that may result in unexpected behavior based on config u ##ration changes or updating of files that could result in subsequent exec u ##tion of a malicious application if triggered . Honeywell recommends updating to the most recent version of the product . See Honeywell Se ##c uri t ##y Notification for recommendations on upgrading and version ##ing . [SEP]
LIME (words)
An attacker could potentially exploit this vulnerability leading to the ability to modify files on Honeywell Experion ControlEdge VirtualUOC and ControlEdge UOC . This exploit could be used to write a file that may result in unexpected behavior based on configuration changes or updating of files that could result in subsequent execution of a malicious application if triggered. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning.
SHAP (words)
An attacker could potentially exploit this vulnerability leading to the ability to modify files on Honeywell Experion ControlEdge VirtualUOC and ControlEdge UOC . This exploit could be used to write a file that may result in unexpected behavior based on configuration changes or updating of files that could result in subsequent execution of a malicious application if triggered. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning
lrp-distilbert · Pred=NETWORK (0) · p=0.98 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] An attacker could potentially exploit this vulnerability leading to the ability to mod if ##y files on Honeywell Experion Control ##E ##dge Virtual ##U ##OC and Control ##E ##dge U ##OC . This exploit could be used to w ##r ite a file that may result in unexpected behavior based on config u ##ration changes or updating of files that could result in subsequent exec u ##tion of a malicious application if triggered . Honeywell recommends updating to the most recent version of the product . See Honeywell Se ##c uri t ##y Notification for recommendations on upgrading and version ##ing . [SEP]
LRP (+Pred, pos-only)
[CLS] An attacker could potentially exploit this vulnerability leading to the ability to mod if ##y files on Honeywell Experion Control ##E ##dge Virtual ##U ##OC and Control ##E ##dge U ##OC . This exploit could be used to w ##r ite a file that may result in unexpected behavior based on config u ##ration changes or updating of files that could result in subsequent exec u ##tion of a malicious application if triggered . Honeywell recommends updating to the most recent version of the product . See Honeywell Se ##c uri t ##y Notification for recommendations on upgrading and version ##ing . [SEP]
LIME (words)
An attacker could potentially exploit this vulnerability leading to the ability to modify files on Honeywell Experion ControlEdge VirtualUOC and ControlEdge UOC . This exploit could be used to write a file that may result in unexpected behavior based on configuration changes or updating of files that could result in subsequent execution of a malicious application if triggered. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning.
SHAP (words)
An attacker could potentially exploit this vulnerability leading to the ability to modify files on Honeywell Experion ControlEdge VirtualUOC and ControlEdge UOC . This exploit could be used to write a file that may result in unexpected behavior based on configuration changes or updating of files that could result in subsequent execution of a malicious application if triggered. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning
#79 · cve_id CVE-2020-19703 · av
GT=NETWORK (0)
xlnet · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁A cross-site scripting ( XSS ) ▁vulnerability ▁in ▁the referer param eter ▁of ▁D zz office ▁2 . 02 ▁allows ▁attackers ▁to ▁execute ▁arbitrary ▁web sc ▁rip t s ▁or HTML ▁via ▁a ▁crafted ▁payload . <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
A cross-site scripting (XSS) vulnerability in the referer parameter of Dzzoffice 2.02 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
SHAP (words)
A cross- site scripting ( XSS) vulnerability in the referer parameter of Dzzoffice 2. 02 allows attackers to execute arbitrary web scripts or HTML via a crafted payload
lrp-bert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] A cross-site scripting ( XSS ) vulnerability in the referer param et ##er of D ##zzo ##ff ##ice 2 . 02 allows attackers to exec u ##te arbitrary web sc r ip t ##s or HTML via a crafted payload . [SEP]
LRP (+Pred, pos-only)
[CLS] A cross-site scripting ( XSS ) vulnerability in the referer param et ##er of D ##zzo ##ff ##ice 2 . 02 allows attackers to exec u ##te arbitrary web sc r ip t ##s or HTML via a crafted payload . [SEP]
LIME (words)
A cross-site scripting (XSS) vulnerability in the referer parameter of Dzzoffice 2.02 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
SHAP (words)
A cross- site scripting ( XSS) vulnerability in the referer parameter of Dzzoffice 2. 02 allows attackers to execute arbitrary web scripts or HTML via a crafted payload
lrp-distilbert · Pred=NETWORK (0) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] A cross-site scripting ( XSS ) vulnerability in the referer param et ##er of D ##zzo ##ff ##ice 2 . 02 allows attackers to exec u ##te arbitrary web sc r ip t ##s or HTML via a crafted payload . [SEP]
LRP (+Pred, pos-only)
[CLS] A cross-site scripting ( XSS ) vulnerability in the referer param et ##er of D ##zzo ##ff ##ice 2 . 02 allows attackers to exec u ##te arbitrary web sc r ip t ##s or HTML via a crafted payload . [SEP]
LIME (words)
A cross-site scripting (XSS) vulnerability in the referer parameter of Dzzoffice 2.02 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
SHAP (words)
A cross- site scripting ( XSS) vulnerability in the referer parameter of Dzzoffice 2. 02 allows attackers to execute arbitrary web scripts or HTML via a crafted payload
#80 · cve_id CVE-2023-21785 · av
GT=LOCAL (2)
xlnet · Pred=LOCAL (2) · p=0.99 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
▁3 D Build er Remote ▁Code Execution Vulnerability <sep> <cls>
LRP (+Pred, pos-only)
n/a
LIME (words)
3D Builder Remote Code Execution Vulnerability
SHAP (words)
3D Builder Remote Code Execution Vulnerability
lrp-bert · Pred=LOCAL (2) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] 3D Builder Remote Code Execution Vulnerability [SEP]
LRP (+Pred, pos-only)
[CLS] 3D Builder Remote Code Execution Vulnerability [SEP]
LIME (words)
3D Builder Remote Code Execution Vulnerability
SHAP (words)
3D Builder Remote Code Execution Vulnerability
lrp-distilbert · Pred=LOCAL (2) · p=1.00 TP
Row 1: IG / LRP(+Pred) · Row 2: LIME / SHAP
IG (subwords)
[CLS] 3D Builder Remote Code Execution Vulnerability [SEP]
LRP (+Pred, pos-only)
[CLS] 3D Builder Remote Code Execution Vulnerability [SEP]
LIME (words)
3D Builder Remote Code Execution Vulnerability
SHAP (words)
3D Builder Remote Code Execution Vulnerability